Featured Blog Post

Radware – Staying Ahead of the Bad Guys

Let’s start with a little bit about yourself and your background. I grew up i...

Array Networks – Agility and Performance

Let’s start with a little bit about yourself and your background. I have b...

TechTerms.com – Teaching the Language of Technolog...

Please start with a little bit about yourself and your background. My...

IEEE Computer Society – It is Not Just About the T...

Please tell me a little bit about yourself and your background. My...

VPN Use and Data Privacy Stats for 2017

We presented a host of survey findings regarding vital internet trends in a ...

Cyber Intelligence From the Deep Web – A Rar...

  vpnMentor: Please tell us about your personal background and the...

DON’T LET THE U.S. GOVERNMENT HACK OUR COMPU...

What is rule 41 and how does it affect you, living outside the U.S? Rule 41...

How to Access Gmail in China

The Chinese authority go to great lengths to put barriers between people...

How to Access Dropbox in China

China has been attempting to block Dropbox since 2010. However, Dropbox...

VPN Protocol Comparison: PPTP vs. L2TP vs. OpenVPN...

It’s becoming quite obvious that most VPN encryption technologies...

Proxies vs VPNs – Understanding the Difference

The purpose of using both VPN and proxy servers is to conceal the users...

Is Time4Popcorn Safe?

It goes without saying that anyone who is reading our posts on a regular...

An Introduction to Hiding your OpenVPN Traffic

It is worth noting that internet restrictions have tightened around the...

All you need to Know About DD-WRT

DD-WRT is essentially a firmware of wireless routers and access points. This...

Protecting Your Privacy Online – Everything ...

Taking technology for granted has its implications, especially when it means...

A better alternative to Google Ad Preview Tool to ...

Using Ad Preview Tool might not be the best way to check ads for a...

EXCLUSIVE: A breach in the encryption mechanism of...

A three days long hackathon on the subject of anonymity on the web at Bar...

Our Latest Blog Posts

Hack-Proof Your Life Now! The New Cybersecurity Rules- Free Chapter Included!

Sean M. Bailey's interest in fraud started as a college journalist in the 1980s, when his reporting about a vote-buying scheme in North Carolina angered

Read Post >>
ditsa
Ditsa Keren
Apr 20, 2017

Five Eyes Countries (or Nine Eyes/Fourteen Eyes)- Crucial for VPN Users to Understand

In the discussion surrounding VPNs – specifically, which offer the best privacy – you may have come across the term Five Eyes, Nine Eyes, or Fourteen Eye

Read Post >>
Daniel Krohn
Apr 19, 2017

Radware – Staying Ahead of the Bad Guys

Carl Herberger has gone from protecting his country on the battlefield to protecting his customers in cyberspace. As the Vice President of Security

Read Post >>
jackie
Jackie Goldstein
Apr 13, 2017

Accessing YouTube TV from outside the Five Cities in Which is it Available

It is finally here; the long-awaited YouTube TV has been launched. There just one little snag: you currently need to live in one of 5 areas in the U.S. to

Read Post >>
Catherine Ablett
Apr 13, 2017

NordVPN Can be Used to Unblock Netflix – Here’s How!

Netflix is an amazing content streaming platform. Unfortunately, access is limited in many parts of the world, but NordVPN can help you access any shows,

Read Post >>
Daniel Krohn
Apr 12, 2017

Array Networks – Agility and Performance

Array Networks is a global leader in application delivery networking and security solutions. They offer enterprises the choice of either hardware

Read Post >>
jackie
Jackie Goldstein
Apr 11, 2017

The Hacker Playbook 2: Practical Guide To Penetration Testing – Free Chapter Included

Peter Kim describes himself as heavily involved in the security community. He's spent the last ten years working as a penetration tester and incident

Read Post >>
ditsa
Ditsa Keren
Apr 09, 2017

ExpressVPN Can Unblock Netflix – Here’s How!

Netflix is an amazing content streaming platform. Unfortunately, access is limited in many parts of the world, but a ExpressVPN can help you access any

Read Post >>
Daniel Krohn
Apr 06, 2017

Why Encrypted Messaging Apps Should Not be Trusted

Fidelis Cybersecurity have recently expressed their growing concern related to the safety of using messaging apps like whatsapp, signal and others. We

Read Post >>
ditsa
Ditsa Keren
Apr 06, 2017

The Refund Diaries – Who Can You Trust to Give Your Money Back?

• We noticed reviews in which users complain about not receiving refunds from VPN providers.
• We ran our own test to see who honors their refund pol

Read Post >>
Daniel Krohn
Apr 05, 2017

Security and the Networked Society- An in-Depth Look at Humanity in the Digital Age

Dr. Mark A Gregory is an award winning professor teaching the next generation of Australian engineers. Having released more than 100 publications, his

Read Post >>
ditsa
Ditsa Keren
Apr 03, 2017

TechTerms.com – Teaching the Language of Technology

No matter how technically savvy one might be, we still come across terms that we don’t know or are not sure we completely understand. Simply doing a G

Read Post >>
jackie
Jackie Goldstein
Apr 02, 2017

The Ask Leo Guide to Staying Safe on the Internet- First Chapter Included!

Ask Leo is a one man brand, responsible for the publication of a series of books about backups and general computer literacy. His latest book, The Ask Leo

Read Post >>
ditsa
Ditsa Keren
Apr 02, 2017

BolehVPN Traffic Obfuscation Keeps You out of Trouble, Even in China

BolehVPN is a Seychelle based VPN provider that offers some advanced features, such as traffic obfuscation and military grade encryption. In this

Read Post >>
ditsa
Ditsa Keren
Mar 31, 2017

Online Privacy Guide for Journalists 2017

You can see the eBook PDF-version of this guide here.   1. Introduction Many veteran journalists, but not only these, surely noticed that we are

Read Post >>
Michael Dagan
Mar 30, 2017

Being a VPN Provider in a Heavily Censored Environment- VPN.asia

As the name implies, VPN.asia is a service provider focused on one of the most restricted and problematic areas in the world, in terms of internet access.

Read Post >>
ditsa
Ditsa Keren
Mar 30, 2017

Your Private Data Is Up for Sale – With the Blessing of The US Senate

The US Senate has voted to let ISPs sell their user's private data, including browsing history, geolocation data, to advertisers and partner companies.

Read Post >>
Catherine Ablett
Mar 27, 2017

IEEE Computer Society – It is Not Just About the Technology

The IEEE is the world's largest technical professional organization for the advancement of technology and its Computer Society is the largest society

Read Post >>
jackie
Jackie Goldstein
Mar 23, 2017

Why Brits (Especially) Should Protect Their Online Privacy

• The Investigatory Powers Act was passed in the UK in 2016
• UK citizen's online activity is heavily tracked and snooped-upon by GCHQ, even via web

Read Post >>
ariel
Ariel Hochstadt
Mar 22, 2017

Privacy in Technology – Standards and Practices for Engineers, Security and IT Professionals

JC Cannon is considered as one of the foremost privacy authorities in the US. His background includes over 30 years of developing policies and standards,

Read Post >>
ditsa
Ditsa Keren
Mar 20, 2017