Also, TunnelBear’s Android app and API contained three high vulnerabilities.Īll of these “soft spots” were addressed accordingly by the engineering team and Cure53 also verified them as fixed. TunnelBear representatives stated that “it would have been nice to be stronger out of the gate,” but they were glad they were able to fix all of the problems discovered. The Mac app contained a vulnerability that allowed hackers to take over the device. Vulneraries Foundīack in 2016, two major flaws were discovered in TunnelBear’s Chrome extension, one of which enabled hackers to turn off the extension. It’s the first time in VPN history that a company ordered this sort of testing and TunnelBear was very frank and open about the final results. In 2017, another 8-day audit was also conducted. They gave Cure53 full access to their systems and coding back in late 2016. They hired Cure53, an any-based penetration-testing company, to give their systems a proper run for their money. Apparently, they’ve decided to put their money where their mouth is, so they ordered a third-party security audit. TunnelBear’s team has always strived to demonstrate and prove the security level of their service. Click Here to Visit TunnelBear Third Party Security Reassurance
0 Comments
Leave a Reply. |