Featured Blog Post

SecureMySocial – Making Sure You Never Share Somet...

Most of us are too busy having fun on social media to recognize the many...

Factom – Using Blockchain to Help the Mortgage Ind...

While many people have heard of Bitcoins or cryptocurrency, far fewer people...

Apperian – Managing and Securing Corporate Mobile ...

"As the age of the workforce drops, employees expect all work-related...

Coronet – Allowing You to Safely Use Any Wi-Fi or ...

Let’s be honest – how many of us think about security risks as we race into a c...

VPNs 101 – vpnMentor’s VPN Guide for N...

If you're alive, surfing the web in the year 2017, and living anywhere that...

Webroot – Cloud-Based Protection For Home Users an...

Although Webroot is not yet a household name, it may very well become one...

VKANSEE – High-Resolution  Fingerprint Sensors

The idea of biometric identification replacing passwords as the standard...

LIFARS – Proactive and Reactive Cybersecurity Solu...

When most people hear the word “forensics” they think of police inv...

Cyren – Taking Internet Security to the Cloud

Lior Samuelson has been around technology and businesses for many years, but...

Auth0 – Making it Easy to Implement Identity Featu...

There is no doubt that user identity, authentication, and authorization is...

Sqrrl – Hunting Threats Before They Do Real Damage...

Wouldn’t it be great if instead of reacting to security attacks we could a...

Black Duck Software – Managing and Securing Your ...

It is no secret that the use of open source software components is growing...

Digital Guardian – Protecting Your Data From Both...

Most efforts at security today focus on keeping out the “bad guys” and bui...

The SSL Store – Not Just Licenses

When Google announced that they would be penalizing the ranking of web sites...

Radware – Staying Ahead of the Bad Guys

Carl Herberger has gone from protecting his country on the battlefield to...

Array Networks – Agility and Performance

Array Networks is a global leader in application delivery networking and...

TechTerms.com – Teaching the Language of Technolog...

No matter how technically savvy one might be, we still come across terms...

IEEE Computer Society – It is Not Just About the T...

The IEEE is the world's largest technical professional organization for the...

VPN Use and Data Privacy Stats for 2017

We presented a host of survey findings regarding vital internet trends in a ...

Cyber Intelligence From the Deep Web – A Rar...

  vpnMentor: Please tell us about your personal background and the...

DON’T LET THE U.S. GOVERNMENT HACK OUR COMPU...

What is rule 41 and how does it affect you, living outside the U.S? Rule 41...

EXCLUSIVE: A breach in the encryption mechanism of...

A three days long hackathon on the subject of anonymity on the web at Bar...

A better alternative to Google Ad Preview Tool to ...

Using Ad Preview Tool might not be the best way to check ads for a...

Protecting Your Privacy Online – Everything ...

Taking technology for granted has its implications, especially when it means...

All you need to Know About DD-WRT

DD-WRT is essentially a firmware of wireless routers and access points. This...

An Introduction to Hiding your OpenVPN Traffic

It is worth noting that internet restrictions have tightened around the...

Is Time4Popcorn Safe?

It goes without saying that anyone who is reading our posts on a regular...

Proxies vs VPNs – Understanding the Difference

The purpose of using both VPN and proxy servers is to conceal the users...

VPN Protocol Comparison: PPTP vs. L2TP vs. OpenVPN...

  By now it's become quite obvious that many VPN encryption...

How to Access Dropbox in China

China has been attempting to block Dropbox since 2010. However, Dropbox...

How to Access Gmail in China

The Chinese authority go to great lengths to put barriers between people...

Our Latest Blog Posts

SecureMySocial – Making Sure You Never Share Something That You Shouldn’t

Most of us are too busy having fun on social media to recognize the many dangers that lurk there. We have gotten into the habit of sharing everything,

Read Post >>
Jackie Goldstein
Jun 26, 2017

Factom – Using Blockchain to Help the Mortgage Industry

While many people have heard of Bitcoins or cryptocurrency, far fewer people are familiar with the underlying technology called “blockchain.” However, blo

Read Post >>
Jackie Goldstein
Jun 25, 2017

How to Watch the 2017 Wimbledon Tournament Online for FREE

The biggest tennis tournament of the year is starting on Monday, July 3rd. BBC is hosting it for its 90th year, and it’s supposed to be epic. But unless y

Read Post >>
Sarit Newman
Jun 22, 2017

IP Leaks – How to Check If Your VPN Works

You might be using the best VPN in the market thinking your real IP address and online activities remain concealed, but using a VPN does not guarantee

Read Post >>
Harsh Maurya
Jun 21, 2017

Online Censorship: A Global Map & Ranking of Every Country’s Internet Restrictions (Infographic)

Do you know what internet activities are illegal in your country?  Online censorship is the latest battleground in the fight for freedom of

Read Post >>
Ariel Hochstadt
Jun 20, 2017

How to REALLY Hide Your IP Address with a VPN

If you use the internet, you have an IP address. Just like your home address, your IP address displays your location and allows information to be sent

Read Post >>
Sarit Newman
Jun 15, 2017

Science of Cybersecurity by Alan Radley- Free Chapter Included

How can we characterise Cybersecurity? How do data breaches, hacks, system exploits and computer intrusions happen - and why? What occurs when

Read Post >>
Ditsa Keren
Jun 15, 2017

Meet Sitelock – a Website Security Firm by Neill Feather

Neill Feather is the president of SiteLock, a leading provider of website security solutions for business. At SiteLock, Neill leads the company's approach

Read Post >>
Ditsa Keren
Jun 14, 2017

The 20 Biggest Hacking Attacks of All Time

There's little doubt that the internet has transformed the modern world as we know it, and mostly in a positive way. From the ability to access

Read Post >>
Ariel Hochstadt
Jun 08, 2017

Apperian – Managing and Securing Corporate Mobile Apps

"As the age of the workforce drops, employees expect all work-related functions and corporate information to be available on their phones or other mobile

Read Post >>
Jackie Goldstein
Jun 07, 2017

10 Alternatives To ExtraTorrent That Will Do The Trick

Up until 2 weeks ago, ExtraTorrent was the second largest torrent site in the world, offering a free file sharing index with thousands of movies, games,

Read Post >>
Ditsa Keren
Jun 05, 2017

Moving Towards Policy Based Access Control is the Future of IAM

As more and more businesses are moving to the cloud, managing access permissions has become a daunting, yet crucial task for maintaining information

Read Post >>
Ditsa Keren
Jun 04, 2017

Coronet – Allowing You to Safely Use Any Wi-Fi or Cellular Network

Let’s be honest – how many of us think about security risks as we race into a coffee shop to check our email or the latest sports scores? Unfortunately, the

Read Post >>
Jackie Goldstein
May 30, 2017

Trustlook Releases a Vaccine to the Wannacry Attack

2 weeks after its outbreak, the Wannacry attack is still taking victims, blackmailing some of the largest data centers in the world, including banks,

Read Post >>
Ditsa Keren
May 29, 2017

VPNs 101 – vpnMentor’s VPN Guide for Newbies

If you're alive, surfing the web in the year 2017, and living anywhere that isn't under a rock, , you've undoubtedly heard and read the term "VPN" at

Read Post >>
Hilah Mazyar
May 28, 2017

Webroot – Cloud-Based Protection For Home Users and Businesses

Although Webroot is not yet a household name, it may very well become one very soon. In my discussion with Paul Barnes, Senior Director of Product

Read Post >>
Jackie Goldstein
May 26, 2017

VKANSEE – High-Resolution  Fingerprint Sensors

The idea of biometric identification replacing passwords as the standard method of identifying users has moved from a future technology in movies to

Read Post >>
Jackie Goldstein
May 26, 2017

LIFARS – Proactive and Reactive Cybersecurity Solution

When most people hear the word “forensics” they think of police investigations and TV shows like CSI and Law and Order.  However, in the rapidly expanding worl

Read Post >>
Jackie Goldstein
May 25, 2017

Live Updates: Online Censorship News

This is an on-going log of events concerning censorship around the globe. We update this page with the latest news regarding online

Read Post >>
Catherine Ablett
May 25, 2017

Cyren – Taking Internet Security to the Cloud

Lior Samuelson has been around technology and businesses for many years, but he is particularly passionate about making the Internet a safer place for

Read Post >>
Jackie Goldstein
May 24, 2017
12345...10...