Featured Blog Post

VPN Use and Data Privacy Stats for 2017

We presented a host of survey findings regarding vital internet trends in a ...

Cyber Intelligence From the Deep Web – A Rar...

  vpnMentor: Please tell us about your personal background and the...

DON’T LET THE U.S. GOVERNMENT HACK OUR COMPU...

What is rule 41 and how does it affect you, living outside the U.S? Rule 41...

How to Access Gmail in China

The Chinese authority go to great lengths to put barriers between people...

How to Access Dropbox in China

China has been attempting to block Dropbox since 2010. However, Dropbox...

VPN Protocol Comparison: PPTP vs. L2TP vs. OpenVPN...

While it’s becoming quite obvious that most VPN encryption technologies are c...

Proxies vs VPN – Understanding the Difference

The purpose of using both VPN and proxy servers is to conceal the users...

Is Time4Popcorn Safe?

It goes without saying that anyone who is reading our posts on a regular...

An Introduction to Hiding your OpenVPN Traffic

It is worth noting that internet restrictions have tightened around the...

All you need to Know About DD-WRT

DD-WRT is essentially a firmware of wireless routers and access points. This...

Protecting Your Privacy Online – Everything ...

Taking technology for granted has its implications, especially when it means...

A better alternative to Google Ad Preview Tool to ...

Using Ad Preview Tool might not be the best way to check ads for a...

EXCLUSIVE: A breach in the encryption mechanism of...

A three days long hackathon on the subject of anonymity on the web at Bar...

Our Latest Blog Posts

Free chapter of Firewalls Don’t Stop Dragons- A Step by Step Guide to Computer Security For Non-Techies

Carey parker, the author of Firewalls Don’t Stop Dragons- A Step by Step Guide to Computer Security For Non-Techies has been a software engineer for about 2

Read Post >>
Ditsa Keren 150x107
Ditsa Keren
Jan 19, 2017

An Interview with That One Privacy Guy- The Man Behind That One Privacy Site

That One Privacy Guy (to make it easier, most refer to him as simply TOPG) created the cybersecurity website Thatoneprivacysite.net in 2015. TOPG, who has

Read Post >>
DanielKrohn_150
Daniel Krohn
Jan 17, 2017

Keeping Your Chitchat secure: Are Viber, WhatsApp and FaceTime Secure? What About the Others?

Whether it’s a personal secret, a company agenda, a business deal or simply breakings news, here’s a look at how to keep our private conversations, pri

Read Post >>
DanielKrohn_150
Daniel Krohn
Jan 12, 2017

How to Apply Tricky NordVPN Discount Codes and Get 70% off your Subscription

NordVPN has two awesome discount codes, but they are tricky to apply; we show you how to apply

Read Post >>
DanielKrohn_150
Daniel Krohn
Jan 10, 2017

Advanced Detection Based on Unsupervised Machine Learning

Gilad Peleg started his career at the Israeli Defense Forces (IDF) elite cyber security unit, at the center for cryptography and security. Later, he led

Read Post >>
Ditsa Keren 150x107
Ditsa Keren
Jan 10, 2017

Challenges of Law Compliance in the Data Security Arena

PrimeSec CEO Or Lavi served a commanding role in the 8200 army reserves unit, where he gained his first hands on experience in managing Information

Read Post >>
Ditsa Keren 150x107
Ditsa Keren
Jan 10, 2017

Internet Trends, stats & facts in the U.S. and Worldwide 2017

The following collection of charts represents the most trusted research and the most recent data on major internet trends. Feel free to use the charts

Read Post >>
anonymous-guy-fawkes-mask
Guy Fawkes
Jan 05, 2017

How to Pay Anonymously. The Ins and Outs of Anonymous Payment Methods

• Use TOR or other methods to hide IP address. When Bitcoin transactions are transmitted over TOR, there is no way to determine where they o

Read Post >>
DanielKrohn_150
Daniel Krohn
Jan 03, 2017

VPN Use and Data Privacy Stats for 2017

We presented a host of survey findings regarding vital internet trends in a previous article. We hope you found it useful! Yet at our core, we want our

Read Post >>
oie_161428394saH3N9r
Ariel Hochstadt
Jan 01, 2017

Top (REALLY FREE) vpn services 2017

There are many reasons why you would want to use a VPN. For many people, security concerns of being tracked by either their ISPs or the government is one

Read Post >>
ranipicgif-1-e1458470073935
Ran Greenberg
Jan 01, 2017

10 Best Torrent Websites of 2017

Although, 2016 was not a “good” year for torrent websites because of the take downs, domain name seizures, copyright issues and IP blocking. But despite all

Read Post >>
anonymous-guy-fawkes-mask
Guy Fawkes
Jan 01, 2017

Securing Privileged Accounts in a World of Mass Communications

Thycotic dates back all the way to 1996, when it was initially founded as a consulting company that helped to solve user access issues in Microsoft, Linux

Read Post >>
Ditsa Keren 150x107
Ditsa Keren
Dec 21, 2016

The Ultimate Guide for Online Privacy

Thanks to Edward Snowden releasing the documents regarding NSA spying activity, we now have an idea of just how vulnerable we are when we are online. The

Read Post >>
DanielKrohn_150
Daniel Krohn
Dec 21, 2016

7 Golden Rules To Better Password Security

- Having different passwords for different services is a must
- Updating passwords frequently is a must
- Using a (silly) phrase is a suggested

Read Post >>
DanielKrohn_150
Daniel Krohn
Dec 21, 2016

How to open a VPN Account with HotSpot Shield and Install it on Windows

Hotspot Shield is a VPN service with relatively good reviews, but like any online service, reviews aren't always enough to make the right choice. As your

Read Post >>
Ditsa Keren 150x107
Ditsa Keren
Dec 20, 2016

Protecting Your Data From Insider Threats

Preempt is a US-Israel collaboration founded by Ajit Sancheti and Roman Blachman. A couple of years ago they realized that one of the biggest challenges

Read Post >>
Ditsa Keren 150x107
Ditsa Keren
Dec 12, 2016

Why Intelligence is the Key to Securing Your Brand

Amir Ofek came from the renowned 8200 unit in the IDF, where he served for 5 years as the head of a large department, and led courses on IT and

Read Post >>
Ditsa Keren 150x107
Ditsa Keren
Dec 05, 2016

Hacking and Pen Testing: Become an Expert in Computer Hacking and Security- Free Chapter Included!

According to author James Smith, hacking is a skill that can be useful in many different ways. Knowledge of hacking can be used as the backbone to

Read Post >>
Ditsa Keren 150x107
Ditsa Keren
Nov 30, 2016

Free Chapter of Bitcoin for the Befuddled by Chris Wilmer and Conrad Barski

With its non-technical language and patient, step-by-step approach to this fascinating currency, Bitcoin for the Befuddled is your ticket to getting

Read Post >>
Ditsa Keren 150x107
Ditsa Keren
Nov 30, 2016

Free Chapter of Cybersecurity: Issues of Today, a Path for Tomorrow, by Daniel Reis

Daniel Reis has spent over twenty five years working with major technology companies and customers to define and manage existing and new security

Read Post >>
Ditsa Keren 150x107
Ditsa Keren
Nov 30, 2016