Featured Blog Post

LIFARS – Proactive and Reactive Cybersecurity Solu...

When most people hear the word “forensics” they think of police inv...

Cyren – Taking Internet Security to the Cloud

Lior Samuelson has been around technology and businesses for many years, but...

Auth0 – Making it Easy to Implement Identity Featu...

There is no doubt that user identity, authentication, and authorization is...

Sqrrl – Hunting Threats Before They Do Real Damage...

Wouldn’t it be great if instead of reacting to security attacks we could a...

Black Duck Software – Managing and Securing Your ...

Please tell me a little bit about yourself and your background. I have been...

Digital Guardian – Protecting Your Data From Both...

Please tell me a little bit about yourself and your background. I have been...

The SSL Store – Not Just Licenses

Please tell me a little bit about yourself and your background. I started...

Radware – Staying Ahead of the Bad Guys

Let’s start with a little bit about yourself and your background. I grew up i...

Array Networks – Agility and Performance

Let’s start with a little bit about yourself and your background. I have b...

TechTerms.com – Teaching the Language of Technolog...

Please start with a little bit about yourself and your background. My...

IEEE Computer Society – It is Not Just About the T...

Please tell me a little bit about yourself and your background. My...

VPN Use and Data Privacy Stats for 2017

We presented a host of survey findings regarding vital internet trends in a ...

Cyber Intelligence From the Deep Web – A Rar...

  vpnMentor: Please tell us about your personal background and the...

DON’T LET THE U.S. GOVERNMENT HACK OUR COMPU...

What is rule 41 and how does it affect you, living outside the U.S? Rule 41...

EXCLUSIVE: A breach in the encryption mechanism of...

A three days long hackathon on the subject of anonymity on the web at Bar...

A better alternative to Google Ad Preview Tool to ...

Using Ad Preview Tool might not be the best way to check ads for a...

Protecting Your Privacy Online – Everything ...

Taking technology for granted has its implications, especially when it means...

All you need to Know About DD-WRT

DD-WRT is essentially a firmware of wireless routers and access points. This...

An Introduction to Hiding your OpenVPN Traffic

It is worth noting that internet restrictions have tightened around the...

Is Time4Popcorn Safe?

It goes without saying that anyone who is reading our posts on a regular...

Proxies vs VPNs – Understanding the Difference

The purpose of using both VPN and proxy servers is to conceal the users...

VPN Protocol Comparison: PPTP vs. L2TP vs. OpenVPN...

It’s becoming quite obvious that most VPN encryption technologies are c...

How to Access Dropbox in China

China has been attempting to block Dropbox since 2010. However, Dropbox...

How to Access Gmail in China

The Chinese authority go to great lengths to put barriers between people...

Our Latest Blog Posts

LIFARS – Proactive and Reactive Cybersecurity Solution

When most people hear the word “forensics” they think of police investigations and TV shows like CSI and Law and Order.  However, in the rapidly expanding worl

Read Post >>
jackie
Jackie Goldstein
May 25, 2017

Censorship Doesn’t Just Happen Once

In March 2017, the web turned 28. To mark this anniversary, its inventor Sir Tim Berners-Lee, wrote an open letter, in which he outlined what he believed

Read Post >>
Catherine Ablett
May 25, 2017

Cyren – Taking Internet Security to the Cloud

Lior Samuelson has been around technology and businesses for many years, but he is particularly passionate about making the Internet a safer place for

Read Post >>
jackie
Jackie Goldstein
May 24, 2017

Auth0 – Making it Easy to Implement Identity Features

There is no doubt that user identity, authentication, and authorization is becoming increasingly critical to application development today. Most

Read Post >>
jackie
Jackie Goldstein
May 23, 2017

Sqrrl – Hunting Threats Before They Do Real Damage

Wouldn’t it be great if instead of reacting to security attacks we could actually proactively hunt them down and disrupt them before they do any damage? A

Read Post >>
jackie
Jackie Goldstein
May 22, 2017

CompTIA Security+ Guide to Network Security Fundamentals- Free Chapter Included!

Dr. Mark Ciampa is an Associate Professor of Information Systems in the Gordon Ford College of Business at Western Kentucky University.  Prior to this he

Read Post >>
ditsa
Ditsa Keren
May 18, 2017

SCADAfence – Securing The Systems That Power Our Life

SCADAfence is a pioneer in securing Industrial IoT/Industrie 4.0 networks from cyber threats, covering the smart manufacturing and smart building sectors,

Read Post >>
ditsa
Ditsa Keren
May 18, 2017

Become The Ultimate Hacker – Free Chapter by MJG Publishing

"The purpose of Become The Ultimate Hacker – Computer Virus, Cracking, Malware, IT Security and the other books around the series 'Programming for Beg

Read Post >>
ditsa
Ditsa Keren
May 18, 2017

Black Duck Software – Managing and Securing Your Open Source Software

It is no secret that the use of open source software components is growing at a very rapid pace. This is true for both young startup companies as well as

Read Post >>
jackie
Jackie Goldstein
May 17, 2017

Digital Guardian – Protecting Your Data From Both Inside and Outside Threats

Most efforts at security today focus on keeping out the “bad guys” and building strong walls to prevent attackers from getting within reach of sensitive cor

Read Post >>
jackie
Jackie Goldstein
May 15, 2017

What’s the Deal with Identity Theft? Free Chapter Included!

Robert Ryerson entered the financial industry in 1984 when he went through training to be a “stockbroker”, as they were then called, for Shearson Lehman Ame

Read Post >>
ditsa
Ditsa Keren
May 11, 2017

How to Accept Bitcoin Payments with BitcoinPay

Bitcoin, the currency of the modern age, has been around long enough to be changing the game of our financial systems. It is an open source, peer to peer

Read Post >>
ditsa
Ditsa Keren
May 07, 2017

How To Secure Your Data If Your VPN Connection Drops

Ok, so if you’re still window shopping for the ideal VPN or have been using one for some time already, you’ll know there’s one vital ‘make or break’ character

Read Post >>
Daniel Krohn
May 04, 2017

Ajit Pai Declared VPN Industry Man of the Month

Rivals don’t often do favors for each other. But in this “game” of tug of war (or cat and mouse), there’s bound be a few slip ups. And in April 2017, we saw jus

Read Post >>
Ariel Hochstadt
May 03, 2017

The Cyber Security Expert That Got Hacked – A True story by Scott Schober

The front cover of Hacked Again summarizes the author's story in one sentence: It can happen to anyone, even a cybersecurity expert. Scott N.

Read Post >>
ditsa
Ditsa Keren
May 03, 2017

How to Bypass VPN Blocks With Ease

Using a VPN may not always be enough to bypass internet blocks; there are ways in which governments and companies can block VPN use (e.g. IP blocking,

Read Post >>
Hilah Mazyar
Apr 30, 2017

IT Security for the Masses with Avira Freemium Antivirus

Travis Witteveen had gained over 20 years of leadership experience at companies such as AVG Technologies, F-Secure Corporation, and Axent Technologies

Read Post >>
ditsa
Ditsa Keren
Apr 26, 2017

The SSL Store – Not Just Licenses

When Google announced that they would be penalizing the ranking of web sites that did not support the HTTPS protocol, a lot of people started to pay

Read Post >>
jackie
Jackie Goldstein
Apr 26, 2017

Top Proxy Services of 2017

In your search for a VPN, you may have come across proxy servers. Proxy servers are similar to VPNs in the way they work, but bear differences that make

Read Post >>
Daniel Krohn
Apr 26, 2017

Hack-Proof Your Life Now! The New Cybersecurity Rules- Free Chapter Included!

Sean M. Bailey's interest in fraud started as a college journalist in the 1980s, when his reporting about a vote-buying scheme in North Carolina angered

Read Post >>
ditsa
Ditsa Keren
Apr 20, 2017
12345...10...