Featured Blog Post

Ensighten – Assuring EU Consumers’ Privacy in Comp...

With the deadline for enforcement of the European Union’s General Data Protection Regulation (GDPR) quickly approaching, businesses engaging with consumers...

Zertificon – Securing Your Email Both Within and B...

“The entire world is my target market” – that is essentially what Dr. Burkhard Wiegel, CEO of Zertificon is saying about his email encryption products. You...

MailGuard – Proactive Cloud-Based Web and Email Se...

Just like a well-thought-out business plan, building and maintaining an effective cyber security policy and apparatus is a key component of any business to...

BeyondTrust – Making Sure Users Don’t Abuse Their ...

BeyondTrust is convinced that the greatest cause of enterprise data breaches is the fact that users abuse the privileged level of access permission given t...

Lumeta – Providing Complete Visibility and Real-ti...

Cyber security strategy requires that networks be protected from attacks from any number of sources and plenty of products are available that provide some ...

cFocus Software – Automating the Process of Secure...

Now that U.S. government agencies are required to migrate to the cloud, they must assure their information remains secure. And with many agencies having do...

35 Best VPN Deals for Black Friday/Cyber Monday 20...

Black Friday and Cyber Monday might be over, but that doesn't mean you can't get some great deals. Our list of VPN deals and coupons will get you a great d...

The Best (and Worst) Ad Blockers UPDATED

Pop up advertisements are some of the most annoying things you'll find on the Internet, especially when they appear suddenly after you click on a website o...

Donald Trump Used a VPN in China, Here’s Why...

It seems China’s Firewall is no match for U.S. President Donald Trump. While visiting China on an 11-day trip across Asia, Trump managed to tweet a than...

pretty Easy privacy – Effective Email Privacy That...

Leon Schumacher, the Co-Founder and CEO of pretty Easy privacy, is extremely focused on one – and only one – goal. He wants to make email privacy simple to...

5 Best VPN Chrome Extensions in 2018 (that actuall...

Extensions can make your browser that much better. But when it’s private, secure surfing we’re talking about, there are plenty of shady addons and plugins ...

How to Watch ESPN Outside of the US

ESPN is one of the most popular live sports television brands in America attracting millions of viewers. Their Monday Night Football alone draws over 10 mi...

Arxan – Protecting Your Applications at Every Leve...

Despite all of the technologies and efforts invested in protecting an organization’s network, the reality is that there will ultimately be some malware or ...

Masergy – Managed Security Services for Every Budg...

The security threats faced by small and mid-sized organizations are no different from those faced by much larger organizations. However, smaller organizati...

ThreatMetrix – A Global Identity Network of Users,...

When a user visits your company’s website to make a purchase or to apply for an account, how do you know that they are in fact who they claim to be? Are th...

CipherCloud – Protecting Your Data on the Way to C...

My interview with Pravin Kothari, the founder and CEO of CipherCloud, covers a wide range of topics related to security software. Of course, Pravin describ...

Trusona – On a Mission to Eliminate Passwords From...

As soon as I started speaking with Ori Eisen, the founder and CEO of Trusona, I felt a surge of energy in the room. I quickly discovered the reasons for th...

Protenus – Protecting Patient Privacy in Electroni...

Do we really need yet another enterprise threat detection system? If you are in the healthcare field, the answer is a resounding yes! In this interview, Pr...

VPN Use and Data Privacy Stats for 2018

We presented a host of survey findings regarding vital internet trends in a previous article. We hope you found it useful! Yet at our core, we want our ...

Phantom – Automating Threat Response Across Device...

Just about every enterprise and organization today has in place a large assortment of security devices, software, and procedures to respond to security thr...

GamaSec – Enterprise-Grade Security for the SMB M...

The security products offered by GamaSec are so good, they convinced a leading insurance company to offer an insurance policy against data breaches along w...

ERPScan – Securing SAP and Oracle Enterprise Busin...

In this interview with Alexander Polyakov, the founder and CTO of ERPScan, we discuss a relatively new, or at least relatively unknown, form of security vu...

Baffle – Protecting Your Databases From Breaches

As Ameesh Divatia, the co-Founder and CEO of Baffle, likes to say, we need to accept that data breaches are a fact of computing life today. However, his co...

Wombat Security Technologies – Security Training t...

While there is no question in anyone’s mind that companies must provide increased amount of security training to their employees, it is not always obvious ...

VMRay – The Hypervisor-Based Sandbox That Cannot b...

Carsten Willems, the CEO & co-founder of VMRay, has been developing malware detection sandboxes for many years. During that time, he has seen many differen...

iboss – A Single Secure Web Gateway Platform in t...

In my discussion with Peter Martini, the President of iboss, he outlines the current trends driving the secure web gateway market, and security software in...

Nexus – Enabling Trusted Identities

As Magnus Malmström, vice president of products at Nexus Group tells us, Nexus is an established European security company that underwent a significant “ma...

Lastline – Keeping Everyone Safe in a Bigger Sandb...

What started as a university research project has evolved into a leading commercial product for Chris Kruegel, the co-founder and Chief Executive Officer o...

IDVector – Making Privacy and Security Simple

Ben Baumgartner, the co-founder of IDVector, has spent his extensive professional career working in the information security space. For much of that time, ...

BankVault.com – You Can’t Hack Something Tha...

The story of BankVault is a story of pivots. What started as a supercomputing project to create self-evolving IT infrastructure, went through a pivot that ...

ENVEIL – Never Decrypt Your Data

It should not come as any surprise that the mantra repeated by Dr. Ellison Anne Williams, the CEO and founder of ENVEIL is “Encrypt Your Data.” As you will...

Accellion – Securing and Sharing Your Documents Wh...

More and more companies today are subject to strict compliance and regulatory requirement regarding much of the data that they store in their system. In ge...

Panopticon Labs – Making Online Gaming Safe and Fu...

Did you know that the revenues of the online computer gaming industry are larger than that of the Hollywood and music industries combined? With that much m...

GigaTrust – Keeping Your Emails and Documents Safe...

The vast majority of our confidential information today is stored in emails and in documents. That is why GigaTrust is dedicated to making it both easy and...

SecureMySocial – Making Sure You Never Share Somet...

Most of us are too busy having fun on social media to recognize the many dangers that lurk there. We have gotten into the habit of sharing everything, whic...

Factom – Using Blockchain to Help the Mortgage Ind...

While many people have heard of Bitcoins or cryptocurrency, far fewer people are familiar with the underlying technology called “blockchain.” However, bloc...

Confusing Cyber Criminals with Illusive Networks

We formed illusive networks three years ago, determined to solve the issue of targeted attacks. We knew that there were extremely sophisticated attacks hur...

Apperian – Managing and Securing Corporate Mobile ...

"As the age of the workforce drops, employees expect all work-related functions and corporate information to be available on their phones or other mobile d...

Coronet – Allowing You to Safely Use Any Wi-Fi or ...

Let’s be honest – how many of us think about security risks as we race into a coffee shop to check our email or the latest sports scores? Unfortunately, th...

VPN 101 – vpnMentor’s VPN Guide for Ne...

If you're alive, surfing the web in the year 2017, and living anywhere that isn't under a rock, , you've undoubtedly heard and read the term "VPN" at least...

Webroot – Cloud-Based Protection For Home Users an...

Although Webroot is not yet a household name, it may very well become one very soon. In my discussion with Paul Barnes, Senior Director of Product Strategy...

VKANSEE – High-Resolution  Fingerprint Sensors

The idea of biometric identification replacing passwords as the standard method of identifying users has moved from a future technology in movies to common...

LIFARS – Proactive and Reactive Cybersecurity Solu...

When most people hear the word “forensics” they think of police investigations and TV shows like CSI and Law and Order.  However, in the rapidly expanding ...

Cyren – Taking Internet Security to the Cloud

Lior Samuelson has been around technology and businesses for many years, but he is particularly passionate about making the Internet a safer place for user...

Auth0 – Making it Easy to Implement Identity Featu...

There is no doubt that user identity, authentication, and authorization is becoming increasingly critical to application development today. Most developers...

Sqrrl – Hunting Threats Before They Do Real Damage...

Wouldn’t it be great if instead of reacting to security attacks we could actually proactively hunt them down and disrupt them before they do any damage? Ac...

Black Duck Software – Managing and Securing Your ...

It is no secret that the use of open source software components is growing at a very rapid pace. This is true for both young startup companies as well as e...

Digital Guardian – Protecting Your Data From Both...

Most efforts at security today focus on keeping out the “bad guys” and building strong walls to prevent attackers from getting within reach of sensitive co...

The SSL Store – Not Just Licenses

When Google announced that they would be penalizing the ranking of web sites that did not support the HTTPS protocol, a lot of people started to pay attent...

Radware – Staying Ahead of the Bad Guys

Carl Herberger has gone from protecting his country on the battlefield to protecting his customers in cyberspace. As the Vice President of Security Solutio...

Array Networks – Agility and Performance

Array Networks is a global leader in application delivery networking and security solutions. They offer enterprises the choice of either hardware solutions...

TechTerms.com – Teaching the Language of Technolog...

No matter how technically savvy one might be, we still come across terms that we don’t know or are not sure we completely understand. Simply doing a Google...

IEEE Computer Society – It is Not Just About the T...

The IEEE is the world's largest technical professional organization for the advancement of technology and its Computer Society is the largest society withi...

Cyber Intelligence From the Deep Web – A Rar...

  vpnMentor: Please tell us about your personal background and the companies you're involved in. Lets not start in the middle ages, we'll start when I go...

DON’T LET THE U.S. GOVERNMENT HACK OUR COMPU...

What is rule 41 and how does it affect you, living outside the U.S? Rule 41 authorizes federal magistrate judges to issue warrants for law enforcement sea...

EXCLUSIVE: A breach in the encryption mechanism of...

A three days long hackathon on the subject of anonymity on the web at Bar Ilan University has exposed breaches in the encryption mechanism of the search en...

A better alternative to Google Ad Preview Tool to ...

Using Ad Preview Tool might not be the best way to check ads for a particular term and location. In fact, Google’s Ad Preview Tool has quite a few limitati...

Protecting Your Privacy Online – Everything ...

Taking technology for granted has its implications, especially when it means you are sacrificing your privacy in return. Surprisingly, it is not just the N...

All you need to Know About DD-WRT

DD-WRT is essentially a firmware of wireless routers and access points. This firmware works on Linux operating systems and is compatible with different rou...

An Introduction to Hiding your OpenVPN Traffic

It is worth noting that internet restrictions have tightened around the world. Governments are more concerned about the use of OpenVPNs and are doing whate...

Is Time4Popcorn Safe?

It goes without saying that anyone who is reading our posts on a regular basis will know that we are avid fans of the Netflix for Pirates application also ...

Proxies vs VPNs vs Tor – Understanding the Differe...

There are many reasons to use online privacy and anonymity tools when browsing the web, downloading or streaming content. From, as they say, covering one’s...

VPN Protocol Comparison: PPTP vs. L2TP vs. OpenVPN...

  By now it's become quite obvious that many VPN encryption technologies are certified and developed by the National Institute of Standards and Technolo...

How to Access Dropbox in China

China has been attempting to block Dropbox since 2010. However, Dropbox starting using the HTTPS protocol for secure communication in 2014, which helps Dro...

How to Access Gmail in China

The Chinese authority go to great lengths to put barriers between people living in China and some parts of the internet – especially those parts that criti...

Our Latest Blog Posts

What is Ethereum and How Do You Mine It?

Today we will look at ways of mining Ethereum – an open-source blockchain based distributed system for decentralized applications. Although similar to B...

Read Post >>
Harsh Maurya
Feb 20, 2018

Border Control Can Steal Your Information: Here’s How

There’s no denying the fact we live in turbulent times. The surge in terrorism and cyberattacks, among other reasons, has led border authorities around ...

Read Post >>
Ariel Hochstadt
Feb 19, 2018

IPVanish Does Not Work with Netflix – Here’s What to Do

If you regularly stream Netflix with a VPN, you may have seen the image below: VPN providers have their servers blacklisted by Netflix on a regular ...

Read Post >>
Guy Fawkes
Feb 19, 2018

Everything You Need to Know About Geoblocking

Have you ever been outside of the U.S. and tried to access Hulu or Sling TV? If you have, you probably got a message like this: This is called geo-b...

Read Post >>
Kanishk Jain
Feb 19, 2018

The Best FREE VPNs for iPhones and iPads

iOS is considered to be one of the most reliable and secure operating systems today but it still won’t protect you on the internet. VPNs are perfect tools ...

Read Post >>
Guy Fawkes
Feb 19, 2018

How to Make a VPN Undetectable

Everyone should be using a VPN these days for the sake of their security. I’m not a big tech person, but I use a VPN both on my smartphone and on my work d...

Read Post >>
Kim Crawley
Feb 18, 2018

Bitcoin: The Future of Money? by Dominic Frisby – FREE Chapter Included

Everyone is talking about it, but does anyone actually understand how Bitcoin works? Two years ago, Dominic Frisby knew Bitcoin was going to be big, so ...

Read Post >>
Sarit Newman
Feb 15, 2018

The Ultimate Parent Guide for Protecting Your Child on the Internet

Table of contents Introduction Mobile phones and apps Streaming content and smart TVs Gaming consoles and online games Social media...

Read Post >>
Ariel Hochstadt
Feb 15, 2018

How to Watch Antena 3 Outside Spain

Antena 3 is one of Spain’s most recognized TV channels. It became the country’s first nationwide, privately-owned TV station in 1990 breaking the monopoly ...

Read Post >>
Guy Fawkes
Feb 14, 2018

Unlocator Does Not Work with Netflix – Here’s What to Do

People use proxies and VPNs to watch US Netflix in Europe, UK Netflix in Australia, or any other region-specific version of the streaming platform abroad. ...

Read Post >>
Guy Fawkes
Feb 14, 2018

PureVPN Does Not Work With Netflix – Here’s What to Do

It’s another Friday evening — you just want to unwind with some US Netflix even though you don’t live in America. Fortunately, you know what to do, so you ...

Read Post >>
Ariel Hochstadt
Feb 14, 2018

5 Internet Hazards to Know About While Traveling

Whether it’s for business or for pleasure, for many traveling is part of life. In the past, we packed essentials before a trip like a toothbrush, some clot...

Read Post >>
Guy Fawkes
Feb 14, 2018

How to Unblock Wikipedia from Anywhere

Wikipedia is a great source of information. It practically has material for every possible thing under the sun. The website is used by almost everyone from...

Read Post >>
Guy Fawkes
Feb 14, 2018

Can you use a VPN with your Amazon account?

Should You Use A VPN For Amazon Seller Central? As a vendor, there are several reasons why you would use a Virtual Private Network (VPN) for Amazon Seller...

Read Post >>
Donna Moses
Feb 14, 2018

Watch the 2018 IIHF World Championship Online for FREE

The 2018 IIHF World Championship is taking place this coming May with a Scandinavian twist. Denmark will be this year’s home to one of the most anticipated...

Read Post >>
Guy Fawkes
Feb 14, 2018

Watch MasterChef Australia Online for FREE

It’s summertime, which means it’s time for another season of MasterChef Australia. The amazing reality TV series has launched food careers over several ...

Read Post >>
Ariel Hochstadt
Feb 14, 2018

How to Watch the Daytona 500 From Anywhere

Whether you’re a moderate racecar enthusiast or an absolute diehard fan, there is every reason to be hyped for the Daytona 500 this February. Unfortunat...

Read Post >>
Guy Fawkes
Feb 14, 2018

How to Cancel PrivateVPN and Get a Refund

Cancelling your subscription with PrivateVPN is not as straightforward as clicking a button. In fact, PrivateVPN does not provide clear guidelines for c...

Read Post >>
Donna Moses
Feb 14, 2018

How to Watch TV Tokyo from Anywhere

For lovers of anime, access to TV Tokyo is a must. Whether you want to revisit the origins of Dragon Ball or catch up on the latest episodes of Pokémon ...

Read Post >>
Guy Fawkes
Feb 14, 2018

The Best FREE VPNs for China (that actually work in 2018)

If you’re planning a trip to China, one of the biggest challenges to overcome is usually how to bypass The Great Firewall (GFW) in order to maintain access...

Read Post >>
Ariel Hochstadt
Feb 14, 2018