Brett and Deborah Christensen have been a Hoax-Slayers since 2003, researching and writing about online scams and frauds and raising awareness to email, Internet and computer security issues that most common users know nothing about. In this article we give you a sneak preview to their book Protecting Yourself from Identity Theft, Internet Scams & Phone Scams.
Daniel Reis has spent over twenty five years working with major technology companies and customers to define and manage existing and new security products. Dan holds a Bachelor’s degree in economics, an MBA, and a Master’s in Information Systems Security. He spent many years working in network security protection systems and is now Director of Product Marketing with a global leader in threat intelligence. In this article we bring you the first chapter of his book Cybersecurity: Issues of Today, a Path for Tomorrow, where he explores topics organizations and security professionals wrestle with to deploy and maintain a robust secure environment.
Peter Kim describes himself as heavily involved in the security community. He's spent the last ten years working as a penetration tester and incident responder for a variety of business sectors. On his free time, he manages a local hackerspace in Santa Monica, and writes about his research at the SecurePla.net blog. His latest book, The Hacker Playbook 2: Practical Guide To Penetration Testing is a compilation of different methodologies that he's learned over the years, many of which he has presented at multiple security conferences over the years. In this article, Peter Kim gives vpnMentor readers a sneak preview to his book, which is available on Amazon in either Kindle or paperback edition.
Mostafa Hashem Sherif  is the author of Protocols for Secure Electronic Commerce, where he presents a compendium of protocols for securing e-commerce platforms B2B and B2C applications. In this article, vpnMentor brings you the first chapter of this fascinating book, along with a few remarks from the author.
Semperis is an enterprise identity protection company that enables organizations to quickly recover from accidental or malicious changes and disasters that compromise Active Directory, on-premises or in the cloud. In this interview CEO Mickey Bresman explains the importance of the active directory and offers an elegant solution to quickly recover it to prevent downtime when the going gets rough.
Rassoul Ghaznavi-zadeh, author of "kali linux – Hacking tools introduction", has been an IT security consultant since 1999. He started as a network and security engineer, gathering knowledge on enterprise businesses, security governance, and standards and frameworks such as ISO, COBIT, HIPPA, SOC and PCI. With his assistance, numerous enterprise organizations have reached safe harbors by testing, auditing and following his security recommendations.
Harsh Maurya is a software engineer by day and an ethical hacker by night. Although he states that he is not a security or networking expert, he likes to think of himself as qualified for educating the public about online security. In his book How Not to Get Hacked, he gives a beginners' overview of some best practices that would help you protect yourself from online threats. We grabbed Maurya for a quick interview, and got a free chapter from his book How Not to Get Hacked, exclusively for vpnMentor readers!
Hide My Ass VPN offers the most basic features a VPN user can ask for and nothing else, making it perfectly suitable for those without much technical knowledge who just want their IP address hidden, for whatever reason. 'HideMyAss' may sound like a strange name for a VPN, but as always, we had to give it a try for our faithful readers, so In this quick tutorial we're going to show you how you can get your HMA vpn account up and running. Let's get started!
Andrei Alekseyevich Soldatov is a Russian investigative journalist and Russian security services expert. Together with a journalist Irina Borogan he is a co-founder and editor of the Agentura.Ru website, which has been covering Russian federal security service (FSB) and national security issues for more than a decade.
In my previous post, I showed you how you can shut down Cyberghost recurring payments with just one click, but doing so doesn’t cancel your current subscription. After reading this post, you will know exactly what to do to cancel your Cyberghost subscription and get refunded. In order to cancel your subscription with Cyberghost and...