Featured Blog Post

5 Free Alternatives to OperaVPN Now That It Shut D...

OperaVPN just announced that the Android and iOS apps are shutting down on April 30th. While the free browser with the built-in VPN is still working, mo...

Sucuri – Website Security For Any Platform

Website security for small businesses can be just as important as it is for the big players.  However, misinformation regarding what steps can be taken to ...

Ensighten – Assuring EU Consumers’ Privacy in Comp...

With the deadline for enforcement of the European Union’s General Data Protection Regulation (GDPR) quickly approaching, businesses engaging with consumers...

Zertificon – Securing Your Email Both Within and B...

“The entire world is my target market” – that is essentially what Dr. Burkhard Wiegel, CEO of Zertificon is saying about his email encryption products. You...

MailGuard – Proactive Cloud-Based Web and Email Se...

Just like a well-thought-out business plan, building and maintaining an effective cyber security policy and apparatus is a key component of any business to...

BeyondTrust – Making Sure Users Don’t Abuse Their ...

BeyondTrust is convinced that the greatest cause of enterprise data breaches is the fact that users abuse the privileged level of access permission given t...

Lumeta – Providing Complete Visibility and Real-ti...

Cyber security strategy requires that networks be protected from attacks from any number of sources and plenty of products are available that provide some ...

cFocus Software – Automating the Process of Secure...

Now that U.S. government agencies are required to migrate to the cloud, they must assure their information remains secure. And with many agencies having do...

35 Best VPN Deals for Black Friday/Cyber Monday 20...

Black Friday and Cyber Monday might be over, but that doesn't mean you can't get some great deals. Our list of VPN deals and coupons will get you a great d...

The Best (and Worst) Ad Blockers UPDATED

Pop up advertisements are some of the most annoying things you'll find on the Internet, especially when they appear suddenly after you click on a website o...

Donald Trump Used a VPN in China, Here’s Why...

It seems China’s Firewall is no match for U.S. President Donald Trump. While visiting China on an 11-day trip across Asia, Trump managed to tweet a than...

pretty Easy privacy – Effective Email Privacy That...

Leon Schumacher, the Co-Founder and CEO of pretty Easy privacy, is extremely focused on one – and only one – goal. He wants to make email privacy simple to...

5 Best VPN Chrome Extensions in 2018 (that actuall...

Extensions can make your browser that much better. But when it’s private, secure surfing we’re talking about, there are plenty of shady addons and plugins ...

How to Watch ESPN Outside of the US

ESPN is one of the most popular live sports television brands in America attracting millions of viewers. Their Monday Night Football alone draws over 10 mi...

Arxan – Protecting Your Applications at Every Leve...

Despite all of the technologies and efforts invested in protecting an organization’s network, the reality is that there will ultimately be some malware or ...

Masergy – Managed Security Services for Every Budg...

The security threats faced by small and mid-sized organizations are no different from those faced by much larger organizations. However, smaller organizati...

ThreatMetrix – A Global Identity Network of Users,...

When a user visits your company’s website to make a purchase or to apply for an account, how do you know that they are in fact who they claim to be? Are th...

CipherCloud – Protecting Your Data on the Way to C...

My interview with Pravin Kothari, the founder and CEO of CipherCloud, covers a wide range of topics related to security software. Of course, Pravin describ...

Trusona – On a Mission to Eliminate Passwords From...

As soon as I started speaking with Ori Eisen, the founder and CEO of Trusona, I felt a surge of energy in the room. I quickly discovered the reasons for th...

Protenus – Protecting Patient Privacy in Electroni...

Do we really need yet another enterprise threat detection system? If you are in the healthcare field, the answer is a resounding yes! In this interview, Pr...

VPN Use and Data Privacy Stats for 2018

We presented a host of survey findings regarding vital internet trends in a previous article. We hope you found it useful! Yet at our core, we want our ...

Phantom – Automating Threat Response Across Device...

Just about every enterprise and organization today has in place a large assortment of security devices, software, and procedures to respond to security thr...

GamaSec – Enterprise-Grade Security for the SMB M...

The security products offered by GamaSec are so good, they convinced a leading insurance company to offer an insurance policy against data breaches along w...

ERPScan – Securing SAP and Oracle Enterprise Busin...

In this interview with Alexander Polyakov, the founder and CTO of ERPScan, we discuss a relatively new, or at least relatively unknown, form of security vu...

Baffle – Protecting Your Databases From Breaches

As Ameesh Divatia, the co-Founder and CEO of Baffle, likes to say, we need to accept that data breaches are a fact of computing life today. However, his co...

Wombat Security Technologies – Security Training t...

While there is no question in anyone’s mind that companies must provide increased amount of security training to their employees, it is not always obvious ...

VMRay – The Hypervisor-Based Sandbox That Cannot b...

Carsten Willems, the CEO & co-founder of VMRay, has been developing malware detection sandboxes for many years. During that time, he has seen many differen...

iboss – A Single Secure Web Gateway Platform in t...

In my discussion with Peter Martini, the President of iboss, he outlines the current trends driving the secure web gateway market, and security software in...

Nexus – Enabling Trusted Identities

As Magnus Malmström, vice president of products at Nexus Group tells us, Nexus is an established European security company that underwent a significant “ma...

Lastline – Keeping Everyone Safe in a Bigger Sandb...

What started as a university research project has evolved into a leading commercial product for Chris Kruegel, the co-founder and Chief Executive Officer o...

IDVector – Making Privacy and Security Simple

Ben Baumgartner, the co-founder of IDVector, has spent his extensive professional career working in the information security space. For much of that time, ...

BankVault.com – You Can’t Hack Something Tha...

The story of BankVault is a story of pivots. What started as a supercomputing project to create self-evolving IT infrastructure, went through a pivot that ...

ENVEIL – Never Decrypt Your Data

It should not come as any surprise that the mantra repeated by Dr. Ellison Anne Williams, the CEO and founder of ENVEIL is “Encrypt Your Data.” As you will...

Accellion – Securing and Sharing Your Documents Wh...

More and more companies today are subject to strict compliance and regulatory requirement regarding much of the data that they store in their system. In ge...

Panopticon Labs – Making Online Gaming Safe and Fu...

Did you know that the revenues of the online computer gaming industry are larger than that of the Hollywood and music industries combined? With that much m...

GigaTrust – Keeping Your Emails and Documents Safe...

The vast majority of our confidential information today is stored in emails and in documents. That is why GigaTrust is dedicated to making it both easy and...

SecureMySocial – Making Sure You Never Share Somet...

Most of us are too busy having fun on social media to recognize the many dangers that lurk there. We have gotten into the habit of sharing everything, whic...

Factom – Using Blockchain to Help the Mortgage Ind...

While many people have heard of Bitcoins or cryptocurrency, far fewer people are familiar with the underlying technology called “blockchain.” However, bloc...

Confusing Cyber Criminals with Illusive Networks

We formed illusive networks three years ago, determined to solve the issue of targeted attacks. We knew that there were extremely sophisticated attacks hur...

Apperian – Managing and Securing Corporate Mobile ...

"As the age of the workforce drops, employees expect all work-related functions and corporate information to be available on their phones or other mobile d...

Coronet – Allowing You to Safely Use Any Wi-Fi or ...

Let’s be honest – how many of us think about security risks as we race into a coffee shop to check our email or the latest sports scores? Unfortunately, th...

VPN 101 – vpnMentor’s VPN Guide for Ne...

If you're alive, surfing the web in the year 2017, and living anywhere that isn't under a rock, , you've undoubtedly heard and read the term "VPN" at least...

Webroot – Cloud-Based Protection For Home Users an...

Although Webroot is not yet a household name, it may very well become one very soon. In my discussion with Paul Barnes, Senior Director of Product Strategy...

VKANSEE – High-Resolution  Fingerprint Sensors

The idea of biometric identification replacing passwords as the standard method of identifying users has moved from a future technology in movies to common...

LIFARS – Proactive and Reactive Cybersecurity Solu...

When most people hear the word “forensics” they think of police investigations and TV shows like CSI and Law and Order.  However, in the rapidly expanding ...

Cyren – Taking Internet Security to the Cloud

Lior Samuelson has been around technology and businesses for many years, but he is particularly passionate about making the Internet a safer place for user...

Auth0 – Making it Easy to Implement Identity Featu...

There is no doubt that user identity, authentication, and authorization is becoming increasingly critical to application development today. Most developers...

Sqrrl – Hunting Threats Before They Do Real Damage...

Wouldn’t it be great if instead of reacting to security attacks we could actually proactively hunt them down and disrupt them before they do any damage? Ac...

Black Duck Software – Managing and Securing Your ...

It is no secret that the use of open source software components is growing at a very rapid pace. This is true for both young startup companies as well as e...

Digital Guardian – Protecting Your Data From Both...

Most efforts at security today focus on keeping out the “bad guys” and building strong walls to prevent attackers from getting within reach of sensitive co...

The SSL Store – Not Just Licenses

When Google announced that they would be penalizing the ranking of web sites that did not support the HTTPS protocol, a lot of people started to pay attent...

Radware – Staying Ahead of the Bad Guys

Carl Herberger has gone from protecting his country on the battlefield to protecting his customers in cyberspace. As the Vice President of Security Solutio...

Array Networks – Agility and Performance

Array Networks is a global leader in application delivery networking and security solutions. They offer enterprises the choice of either hardware solutions...

TechTerms.com – Teaching the Language of Technolog...

No matter how technically savvy one might be, we still come across terms that we don’t know or are not sure we completely understand. Simply doing a Google...

IEEE Computer Society – It is Not Just About the T...

The IEEE is the world's largest technical professional organization for the advancement of technology and its Computer Society is the largest society withi...

Internet Trends 2018. Stats & Facts in the U....

While we're dedicated to VPN's and online privacy issues, vpnMentor is also your resource for Internet trends and data. As a result, we've scoured the m...

Cyber Intelligence From the Deep Web – A Rar...

  vpnMentor: Please tell us about your personal background and the companies you're involved in. Lets not start in the middle ages, we'll start when I go...

DON’T LET THE U.S. GOVERNMENT HACK OUR COMPU...

What is rule 41 and how does it affect you, living outside the U.S? Rule 41 authorizes federal magistrate judges to issue warrants for law enforcement sea...

EXCLUSIVE: A breach in the encryption mechanism of...

A three days long hackathon on the subject of anonymity on the web at Bar Ilan University has exposed breaches in the encryption mechanism of the search en...

A better alternative to Google Ad Preview Tool to ...

Using Ad Preview Tool might not be the best way to check ads for a particular term and location. In fact, Google’s Ad Preview Tool has quite a few limitati...

Protecting Your Privacy Online – Everything ...

Taking technology for granted has its implications, especially when it means you are sacrificing your privacy in return. Surprisingly, it is not just the N...

All you need to Know About DD-WRT

DD-WRT is essentially a firmware of wireless routers and access points. This firmware works on Linux operating systems and is compatible with different rou...

An Introduction to Hiding your OpenVPN Traffic

It is worth noting that internet restrictions have tightened around the world. Governments are more concerned about the use of OpenVPNs and are doing whate...

Is Time4Popcorn Safe?

It goes without saying that anyone who is reading our posts on a regular basis will know that we are avid fans of the Netflix for Pirates application also ...

Proxies vs VPNs vs Tor – Understanding the Differe...

There are many reasons to use online privacy and anonymity tools when browsing the web, downloading or streaming content. From, as they say, covering one’s...

VPN Protocol Comparison: PPTP vs. L2TP vs. OpenVPN...

  By now it's become quite obvious that many VPN encryption technologies are certified and developed by the National Institute of Standards and Technolo...

How to Access Dropbox in China

China has been attempting to block Dropbox since 2010. However, Dropbox starting using the HTTPS protocol for secure communication in 2014, which helps Dro...

How to Access Gmail in China

The Chinese authority go to great lengths to put barriers between people living in China and some parts of the internet – especially those parts that criti...

Our Latest Blog Posts

Critical Vulnerability Found in Majority of LG NAS Devices

Here at vpnMentor, we are concerned about your security and privacy. Our special team of hackers & researchers roam the internet to find security issues in...

Read Post >>
Sarit Newman
Apr 18, 2018

What is the Dutch Intelligence and Security Services Act referendum?

What is the Dutch Intelligence and Security Services Act referendum? In March, a referendum in the Netherlands saw voters oppose a law that would give the...

Read Post >>
Martijn Grooten
Apr 17, 2018

5 Free Alternatives to OperaVPN Now That It Shut Down

OperaVPN just announced that the Android and iOS apps are shutting down on April 30th. While the free browser with the built-in VPN is still working, mo...

Read Post >>
Sarit Newman
Apr 15, 2018

Report: 50 VPNs share data on their users with Facebook

Is your VPN running the Facebook pixel, thus putting a dent in your privacy? We tested almost 300 — check out the results and see if it’s time you had a wo...

Read Post >>
Ariel Hochstadt
Apr 13, 2018

NordVPN Works in China, But Only If You Do This First

The Great Firewall of China is aptly named after the strict online censorship in the country. It doesn’t just block websites and online apps but also the u...

Read Post >>
Ran Greenberg
Apr 12, 2018

3 Ways to Protect Your Facebook Data from 3rd Party Apps

Are you still using Facebook? Do you feel like you can still trust the social media giant, despite all the data leaks that have occurred in the past few...

Read Post >>
Shauli Zacks
Apr 12, 2018

Actifile Data Centered Tracking Makes Outsourcing Safe

Actifile Data Security Suite is based on a cutting edge file-centric tracking, detection and prevention technology that helps organizations of all sizes to...

Read Post >>
Ditsa Keren
Apr 12, 2018

Secure Your Important Files Right at the Source with BitDam

BitDam deals with detection and prevention of advanced threats that come via email,  and is able to deal with all top-level threats, including malware, ran...

Read Post >>
Ditsa Keren
Apr 12, 2018

How to Go Incognito in Chrome and Why It Isn’t Enough

Google Chrome is currently the most popular browser in the world. It's easy to install and use, and it loads quickly. It also stores your information as...

Read Post >>
Guy Fawkes
Apr 11, 2018

2018’s Best VPNs for Routers – Easy to Set Up and Use

Not every router works with a VPN. You need a router with DD-WRT or Tomato firmware on it, and setting it up can be frustrating. That's why we found the to...

Read Post >>
Ran Greenberg
Apr 11, 2018

Get Ready for the Gulf Information Security Expo & Conference (GISEC) in May 2018

Gulf Information Security Expo & Conference (GISEC) was launched in 2013 with the aim to bring the region’s leading cybersecurity and information security ...

Read Post >>
Ditsa Keren
Apr 11, 2018

How to Download Torrents Anonymously and Safely in 2018

BitTorrent is not a program or software, but rather a technology that facilitates lightning fast downloads and file sharing over a peer-to-peer (P2P) netwo...

Read Post >>
Guy Fawkes
Apr 10, 2018

5 of the Biggest Data Exposures Uncovered through Shodan

Shodan is an incredible tool, but it can be also used for the bad. Here are some of the remarkable discoveries found by searching through Shodan’s servers....

Read Post >>
David Bisson
Apr 10, 2018

6 Ways to Protect Yourself from the CLOUD Act

Online privacy was dealt a major blow at the end of March 2018 when the Clarifying Lawful Overseas Use of Data (CLOUD) Act was added in the near the end of...

Read Post >>
Shauli Zacks
Apr 09, 2018

Report: Only 34% of Websites in the EU are Ready for GDPR

It’s been nearly 2 years since the Council of the European Union, European Parliament and the European Union passed the privacy legislation known as the Ge...

Read Post >>
Shauli Zacks
Apr 05, 2018

2 Ways to Watch UFC Fight Night Outside of the U.S.

Fight nights are full of action and a lot of energy. If you’re in the US, you can watch it on Fox or stream it online. If you’re not in the US, you will...

Read Post >>
Guy Fawkes
Apr 02, 2018

How to Download and Install CyberGhost in 7 Easy Steps

CyberGhost is a Romanian-based VPN that managed to create a solid spot for itself among its peers by providing one of the most well-developed and diverse s...

Read Post >>
Ariel Hochstadt
Apr 02, 2018

CyberGhost Works in China, but Only If You Do This First

While China has some really great places, the main problem that travelers face is the censorship. As you might already know, China has repressive online ce...

Read Post >>
Guy Fawkes
Apr 02, 2018

ExpressVPN Works in China, but Only If You Do This

China is known for its repressive online policies. The residents of China cannot access the websites we visit every day. While we might not be able to imag...

Read Post >>
Guy Fawkes
Apr 02, 2018

Hola Does Not Work with Netflix — Here’s What to Do

Netflix’s VPN blocking game is becoming stronger and stronger. Many VPNs that once granted you access to regional versions of the streaming platform are...

Read Post >>
Guy Fawkes
Mar 29, 2018