Cure53 security audit reaffirms RealVNC’s strong security stance

Cure53 VNC Connect whitebox penetration test

RealVNC has recently engaged with Berlin-based security consultancy Cure53 to perform a complete security audit of its flagship VNC Connect remote access service. The audit included VNC Server and VNC Viewer on all supported platforms (Windows, Mac, Linux, Android, and iOS), the VNC Connect management portal, and backend services.

Counteracting Remote Access MITRE Threat Actions with VNC

remote access MITRE threat actions VNC Connect

Without some form of remote access, threat actors conducting a cyberattack simply wouldn’t succeed. Threat actors leverage remote access services at a number of points within an attack, making it an important – and perhaps necessary – part of a cyberattack. So, how can you plan and prop up a defense against attacks?

RealVNC will be at Infosecurity Europe 2022: Here’s why

Infosecurity Europe 2022 RealVNC

RealVNC will be part of this year’s Infosecurity Europe (Infosec) event. “Defining the Future of Cybersecurity” is the event’s motto – Infosec connects the information and cybersecurity community, showcasing the latest technology and sharing insider insights.

Three ways to use VNC’s superpowers for good

VNC not just for hackers

Because they have have been in the past used by cybercriminals for a variety of threat actions , there’s sometimes an association that may occur in some organizations between VNC-based remote access solutions and malicious activity. However, a secure VNC solution, used as intended, can bring a lot of benefits to your organization.

Five great ways to strengthen your password security

A major password hack is in the news every few weeks; most times, the main reason is (simply) weak passwords. Don’t want to be a victim of the next hack? In this blog, we’ll take a look at five easy steps that you can take to make your passwords stronger.

Breaking down RDP vs. secure remote access

RDP vs Secure Remote Access

At a time when remote access has become a necessary part of most organizations’ operations, it’s necessary to take a look at whether the access provided actually maintains organizational security, productivity, and accessibility. Use of remote access (of every flavor and vendor) by organizations has become a staple due to the shift to a hybrid … Read more