Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Free VPN Apps Found Riddled With Security Flaws
Cyber Security

Free VPN Apps Found Riddled With Security Flaws

Team-CWDBy Team-CWDOctober 2, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A large-scale study of free virtual private network (VPN) apps has uncovered serious privacy and security risks that affect both consumers and enterprises.

The analysis, conducted by Zimperium zLabs, reviewed 800 VPN applications available for Android and iOS and found that many failed to deliver the protection users expect.

Major Security and Privacy Weaknesses

The report, A Deeper Dive: Unpacking the VPN Threat Landscape, showed that free VPN apps often expose users to more danger than they prevent.

Among the issues discovered were outdated libraries, weak encryption practices, misleading privacy disclosures and dangerous permission requests that extend far beyond what a VPN should need.

Researchers highlighted several troubling findings:

  • Some apps continue to use vulnerable libraries such as outdated versions of OpenSSL, including those still susceptible to the infamous Heartbleed bug

  • Roughly 1% of apps allowed Man-in-the-Middle (MitM) attacks, which can let attackers intercept and decrypt traffic

  • About 25% of iOS apps failed to provide a valid privacy manifest, a core requirement under Apple’s rules

  • Many apps requested excessive permissions, including access to microphones, location data or system logs

Read more on mobile security risks: 92% of Mobile Apps Found to Use Insecure Cryptographic Methods

BYOD and Remote Work Increase the Stakes

The study also warned that organizations with bring-your-own-device (BYOD) policies are especially vulnerable. Even widely downloaded VPN apps can become weak links in enterprise defenses, potentially exposing sensitive corporate data.

“As more employees work remotely from home offices or while traveling, they’re not only using personal phones, they’re also using personal laptops as well, often over unsecured networks,” David Matalon, CEO at Venn, said. 

“The traditional perimeter is gone, and the bring-your-own-device (BYOD) reality for remote workers requires a shift in strategy: from securing the device to securing the work itself.”

Matalon added, “VPNs continue to play a vital role in securing and anonymizing network connections, however, they can provide a false sense of security and user privacy.”

He stressed that consumer-grade VPN apps and browser extensions often lack audits, leaving users vulnerable to weak encryption and companies at risk of data loss.

A Shift to Stronger Security Models

On iOS, more than 6% of apps were found requesting private entitlements – permissions that could allow deep access to the operating system.

Although it is unclear if these requests were granted, the findings suggest poor adherence to Apple’s security guidelines.

“Organizations need a multi-layered response,” said Brandon Tarbet, director of IT & security at Menlo Security.

“Endpoint visibility and management is table stakes […] what is rapidly becoming a requirement is the need for web content-level data security.”

James Maude, field CTO at BeyondTrust, pointed out that “VPN technologies have long presented security challenges to organizations in an age of identity attacks and compromises.” 

He emphasized that zero-trust approaches are vital, as compromised VPN access can expand an attacker’s reach across the network.

Vishrut Iyengar, senior solutions manager at Black Duck, added that mobile devices are now a prime target.

“Today, we are facing a concerning reality that many enterprise mobile apps still lack basic protections such as code obfuscation, secure storage and updated third-party libraries,” he explained.

Ultimately, the study concludes that many free VPNs provide little real security. Instead, they can serve as vehicles for surveillance, credential theft and even full device compromise.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleExtortion Emails Sent to Executives by Self-Proclaimed Clop Member
Next Article How One Bad Password Ended a 158-Year-Old Business
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Find your weak spots before attackers do

November 21, 2025

What are brushing scams and how do I stay safe?

December 24, 2025

Don’t let “back to school” become “back to bullying”

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.