{"id":67939,"date":"2025-06-11T12:09:39","date_gmt":"2025-06-11T17:09:39","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=67939"},"modified":"2025-06-11T12:10:13","modified_gmt":"2025-06-11T17:10:13","slug":"vpns-under-attack-why-strong-encryption-matters","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/vpns-under-attack-why-strong-encryption-matters\/","title":{"rendered":"VPNs Under Attack: Why Strong Encryption Matters"},"content":{"rendered":"\n<p>In a world where everything from your texts to your bank details travels through the internet, staying private online is more important than ever. That\u2019s why so many people rely on <strong>Virtual Private Networks (VPNs)<\/strong>. VPNs act like secret tunnels that protect your information as it travels from your device to the internet.<\/p>\n\n\n\n<p>But recently, even these secret tunnels have come under attack.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading\">What\u2019s Going On With VPNs?<\/h1>\n\n\n\n<p>Cybersecurity experts have reported new <strong>vulnerabilities in some popular VPN services<\/strong>, including <strong>Ivanti Connect Secure VPN<\/strong>. Hackers found ways to exploit flaws in the system, allowing them to break into private networks, steal information, and even spread malware.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cIvanti has addressed a critical vulnerability (CVE\u20112025\u201122457) in its Connect Secure (ICS) VPN appliances, which had been exploited in the wild\u2026 The flaw \u2026 carried a critical severity score of 9.0\/10 and enabled remote code execution.\u201d<br>\u2014 <a>TechRadar<\/a><\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cApproximately 16,500 Ivanti Connect Secure and Policy Secure gateways \u2026 are likely vulnerable to a remote code execution (RCE) flaw.\u201d<br>\u2014 <a>ShadowServer Report via TechRadar<\/a><\/p>\n<\/blockquote>\n\n\n\n<p>Another problem has been found in older <strong>tunneling protocols<\/strong>\u2014these are the methods VPNs use to create a secure connection. Some of these older methods (like PPTP) have weak encryption, making it easier for hackers to intercept your data.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cWeak encryption methods like PPTP should be avoided \u2026 modern VPNs should use protocols like OpenVPN or WireGuard for better protection.\u201d<br>\u2014 <a>TechRadar Security Guide<\/a><\/p>\n<\/blockquote>\n\n\n\n<p>These reports show that <strong>not all VPNs are created equal<\/strong>, and without strong protection, even VPNs can be a weak link in your cybersecurity.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading\">Why Strong Encryption Matters<\/h1>\n\n\n\n<p>Encryption is what scrambles your data so that no one else can read it. When you use a VPN, it should protect your data using <strong>modern encryption protocols like <a href=\"http:\/\/pcmatic.com\/vpn\">PC Matic VPN<\/a><\/strong>. But if a VPN uses weak or outdated methods, hackers can break through the encryption and see everything you\u2019re doing online\u2014whether it\u2019s checking emails, paying bills, or chatting with friends.<\/p>\n\n\n\n<p>That\u2019s why <strong>strong encryption<\/strong> isn\u2019t just a nice feature\u2014it\u2019s a must-have.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading\">How to Stay Safe When Using a VPN<\/h1>\n\n\n\n<p>Here are a few ways to protect yourself when using a VPN:<\/p>\n\n\n\n<p><strong>1 &#8211;<\/strong> <strong>Update your VPN software regularly.<\/strong> Hackers often target old, outdated software. New updates fix security flaws that could be used against you.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive requiring federal agencies to patch Ivanti VPN vulnerabilities immediately.<br>\u2014 <a>Axios<\/a><\/p>\n<\/blockquote>\n\n\n\n<p><strong>2 &#8211; Use a VPN with strong encryption protocols.<\/strong> Look for services that use modern tunneling methods like <strong><a href=\"http:\/\/pcmatic.com\/vpn\">PC Matic VPN<\/a><\/strong>.<\/p>\n\n\n\n<p><strong>3 &#8211; Avoid free or unknown VPNs.<\/strong> These might not have proper security and can even sell your data.<\/p>\n\n\n\n<p><strong>4 &#8211; Use multi-factor authentication (MFA)<\/strong> if your VPN offers it. This adds an extra layer of protection.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading\">How PC Matic VPN Can Help<\/h1>\n\n\n\n<p>Not all VPNs are vulnerable\u2014and <strong>PC Matic VPN<\/strong> is designed with <strong>security-first in mind<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>It uses <strong>top-tier encryption<\/strong> to keep your data private and secure.<\/li>\n\n\n\n<li>It includes <strong>regular updates<\/strong> to patch any possible security flaws.<\/li>\n\n\n\n<li>It\u2019s built by a trusted cybersecurity company that\u2019s proudly <strong>Made in America<\/strong>.<\/li>\n\n\n\n<li>It combines perfectly with <strong><a href=\"http:\/\/pcmatic.com\">PC Matic Antivirus<\/a><\/strong>, giving you <strong>all-in-one protection<\/strong> against malware, ransomware, and cyber snoops.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading\">Final Thoughts<\/h1>\n\n\n\n<p>VPNs are still one of the best ways to protect your privacy online\u2014but only if they\u2019re using the right technology. With recent cyberattacks targeting weak VPNs, now is the time to make sure your VPN is secure, updated, and backed by strong encryption.<\/p>\n\n\n\n<p>Don\u2019t take chances. Protect your data with a VPN you can trust\u2014like <strong><a href=\"http:\/\/pcmatic.com\/vpn\">PC Matic VPN<\/a><\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a world where everything from your texts to your bank details travels through the internet, staying private online is more important than ever. That\u2019s why so many people rely on Virtual Private Networks (VPNs). VPNs act like secret tunnels that protect your information as it travels from your device to the internet. But recently, [&hellip;]<\/p>\n","protected":false},"author":83,"featured_media":66486,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[6219,6216],"tags":[],"class_list":["post-67939","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybernews","category-home-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>VPNs Under Attack: Why Strong Encryption Matters<\/title>\n<meta name=\"description\" content=\"In a world where everything from your texts to your bank details travels through the internet, staying private online is more important than ever. That\u2019s\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/vpns-under-attack-why-strong-encryption-matters\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"VPNs Under Attack: Why Strong Encryption Matters\" \/>\n<meta property=\"og:description\" content=\"In a world where everything from your texts to your bank details travels through the internet, staying private online is more important than ever. That\u2019s\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/vpns-under-attack-why-strong-encryption-matters\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-11T17:09:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-11T17:10:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/why-use-a-vpn.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jessica Molden\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Molden\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/vpns-under-attack-why-strong-encryption-matters\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/vpns-under-attack-why-strong-encryption-matters\\\/\"},\"author\":{\"name\":\"Jessica Molden\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\"},\"headline\":\"VPNs Under Attack: Why Strong Encryption Matters\",\"datePublished\":\"2025-06-11T17:09:39+00:00\",\"dateModified\":\"2025-06-11T17:10:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/vpns-under-attack-why-strong-encryption-matters\\\/\"},\"wordCount\":600,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/vpns-under-attack-why-strong-encryption-matters\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/why-use-a-vpn.png\",\"articleSection\":[\"CyberNews\",\"Home Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/vpns-under-attack-why-strong-encryption-matters\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/vpns-under-attack-why-strong-encryption-matters\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/vpns-under-attack-why-strong-encryption-matters\\\/\",\"name\":\"VPNs Under Attack: Why Strong Encryption Matters\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/vpns-under-attack-why-strong-encryption-matters\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/vpns-under-attack-why-strong-encryption-matters\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/why-use-a-vpn.png\",\"datePublished\":\"2025-06-11T17:09:39+00:00\",\"dateModified\":\"2025-06-11T17:10:13+00:00\",\"description\":\"In a world where everything from your texts to your bank details travels through the internet, staying private online is more important than ever. That\u2019s\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/vpns-under-attack-why-strong-encryption-matters\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/vpns-under-attack-why-strong-encryption-matters\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/vpns-under-attack-why-strong-encryption-matters\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/why-use-a-vpn.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/why-use-a-vpn.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/vpns-under-attack-why-strong-encryption-matters\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"VPNs Under Attack: Why Strong Encryption Matters\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\",\"name\":\"Jessica Molden\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/jmolden\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"VPNs Under Attack: Why Strong Encryption Matters","description":"In a world where everything from your texts to your bank details travels through the internet, staying private online is more important than ever. That\u2019s","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/vpns-under-attack-why-strong-encryption-matters\/","og_locale":"en_US","og_type":"article","og_title":"VPNs Under Attack: Why Strong Encryption Matters","og_description":"In a world where everything from your texts to your bank details travels through the internet, staying private online is more important than ever. That\u2019s","og_url":"https:\/\/www.pcmatic.com\/blog\/vpns-under-attack-why-strong-encryption-matters\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2025-06-11T17:09:39+00:00","article_modified_time":"2025-06-11T17:10:13+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/why-use-a-vpn.png","type":"image\/png"}],"author":"Jessica Molden","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Jessica Molden","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/vpns-under-attack-why-strong-encryption-matters\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/vpns-under-attack-why-strong-encryption-matters\/"},"author":{"name":"Jessica Molden","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700"},"headline":"VPNs Under Attack: Why Strong Encryption Matters","datePublished":"2025-06-11T17:09:39+00:00","dateModified":"2025-06-11T17:10:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/vpns-under-attack-why-strong-encryption-matters\/"},"wordCount":600,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/vpns-under-attack-why-strong-encryption-matters\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/why-use-a-vpn.png","articleSection":["CyberNews","Home Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/vpns-under-attack-why-strong-encryption-matters\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/vpns-under-attack-why-strong-encryption-matters\/","url":"https:\/\/www.pcmatic.com\/blog\/vpns-under-attack-why-strong-encryption-matters\/","name":"VPNs Under Attack: Why Strong Encryption Matters","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/vpns-under-attack-why-strong-encryption-matters\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/vpns-under-attack-why-strong-encryption-matters\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/why-use-a-vpn.png","datePublished":"2025-06-11T17:09:39+00:00","dateModified":"2025-06-11T17:10:13+00:00","description":"In a world where everything from your texts to your bank details travels through the internet, staying private online is more important than ever. That\u2019s","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/vpns-under-attack-why-strong-encryption-matters\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/vpns-under-attack-why-strong-encryption-matters\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/vpns-under-attack-why-strong-encryption-matters\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/why-use-a-vpn.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/why-use-a-vpn.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/vpns-under-attack-why-strong-encryption-matters\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"VPNs Under Attack: Why Strong Encryption Matters"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700","name":"Jessica Molden","url":"https:\/\/www.pcmatic.com\/blog\/author\/jmolden\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/67939","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=67939"}],"version-history":[{"count":2,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/67939\/revisions"}],"predecessor-version":[{"id":67941,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/67939\/revisions\/67941"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66486"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=67939"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=67939"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=67939"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}