Featured Blog Post

ThreatMetrix – A Global Identity Network of Users,...

When a user visits your company’s website to make a purchase or to apply for a...

CipherCloud – Protecting Your Data on the Way to C...

My interview with Pravin Kothari, the founder and CEO of CipherCloud, covers...

Trusona – On a Mission to Eliminate Passwords From...

As soon as I started speaking with Ori Eisen, the founder and CEO of...

Protenus – Protecting Patient Privacy in Electroni...

Do we really need yet another enterprise threat detection system? If you are...

VPN Use and Data Privacy Stats for 2017

We presented a host of survey findings regarding vital internet trends in a ...

Phantom – Automating Threat Response Across Device...

Just about every enterprise and organization today has in place a large...

GamaSec – Enterprise-Grade Security for the SMB M...

The security products offered by GamaSec are so good, they convinced a...

ERPScan – Securing SAP and Oracle Enterprise Busin...

In this interview with Alexander Polyakov, the founder and CTO of ERPScan,...

Baffle – Protecting Your Databases From Breaches

As Ameesh Divatia, the co-Founder and CEO of Baffle, likes to say, we need...

Wombat Security Technologies – Security Training t...

While there is no question in anyone’s mind that companies must provide i...

VMRay – The Hypervisor-Based Sandbox That Cannot b...

Carsten Willems, the CEO & co-founder of VMRay, has been developing...

iboss – A Single Secure Web Gateway Platform in t...

In my discussion with Peter Martini, the President of iboss, he outlines the...

Nexus – Enabling Trusted Identities

As Magnus Malmström, vice president of products at Nexus Group tells us, ...

Lastline – Keeping Everyone Safe in a Bigger Sandb...

What started as a university research project has evolved into a leading...

IDVector – Making Privacy and Security Simple

Ben Baumgartner, the co-founder of IDVector, has spent his extensive...

BankVault.com – You Can’t Hack Something Tha...

The story of BankVault is a story of pivots. What started as a...

ENVEIL – Never Decrypt Your Data

It should not come as any surprise that the mantra repeated by Dr. Ellison...

Accellion – Securing and Sharing Your Documents Wh...

More and more companies today are subject to strict compliance and...

Panopticon Labs – Making Online Gaming Safe and Fu...

Did you know that the revenues of the online computer gaming industry are...

GigaTrust – Keeping Your Emails and Documents Safe...

The vast majority of our confidential information today is stored in emails...

SecureMySocial – Making Sure You Never Share Somet...

Most of us are too busy having fun on social media to recognize the many...

Factom – Using Blockchain to Help the Mortgage Ind...

While many people have heard of Bitcoins or cryptocurrency, far fewer people...

Confusing Cyber Criminals with Illusive Networks

We formed illusive networks three years ago, determined to solve the issue...

Apperian – Managing and Securing Corporate Mobile ...

"As the age of the workforce drops, employees expect all work-related...

Coronet – Allowing You to Safely Use Any Wi-Fi or ...

Let’s be honest – how many of us think about security risks as we race into a c...

VPN 101 – vpnMentor’s VPN Guide for Ne...

If you're alive, surfing the web in the year 2017, and living anywhere that...

Webroot – Cloud-Based Protection For Home Users an...

Although Webroot is not yet a household name, it may very well become one...

VKANSEE – High-Resolution  Fingerprint Sensors

The idea of biometric identification replacing passwords as the standard...

LIFARS – Proactive and Reactive Cybersecurity Solu...

When most people hear the word “forensics” they think of police inv...

Cyren – Taking Internet Security to the Cloud

Lior Samuelson has been around technology and businesses for many years, but...

Auth0 – Making it Easy to Implement Identity Featu...

There is no doubt that user identity, authentication, and authorization is...

Sqrrl – Hunting Threats Before They Do Real Damage...

Wouldn’t it be great if instead of reacting to security attacks we could a...

Black Duck Software – Managing and Securing Your ...

It is no secret that the use of open source software components is growing...

Digital Guardian – Protecting Your Data From Both...

Most efforts at security today focus on keeping out the “bad guys” and bui...

The SSL Store – Not Just Licenses

When Google announced that they would be penalizing the ranking of web sites...

Radware – Staying Ahead of the Bad Guys

Carl Herberger has gone from protecting his country on the battlefield to...

Array Networks – Agility and Performance

Array Networks is a global leader in application delivery networking and...

TechTerms.com – Teaching the Language of Technolog...

No matter how technically savvy one might be, we still come across terms...

IEEE Computer Society – It is Not Just About the T...

The IEEE is the world's largest technical professional organization for the...

Cyber Intelligence From the Deep Web – A Rar...

  vpnMentor: Please tell us about your personal background and the...

DON’T LET THE U.S. GOVERNMENT HACK OUR COMPU...

What is rule 41 and how does it affect you, living outside the U.S? Rule 41...

EXCLUSIVE: A breach in the encryption mechanism of...

A three days long hackathon on the subject of anonymity on the web at Bar...

A better alternative to Google Ad Preview Tool to ...

Using Ad Preview Tool might not be the best way to check ads for a...

Protecting Your Privacy Online – Everything ...

Taking technology for granted has its implications, especially when it means...

All you need to Know About DD-WRT

DD-WRT is essentially a firmware of wireless routers and access points. This...

An Introduction to Hiding your OpenVPN Traffic

It is worth noting that internet restrictions have tightened around the...

Is Time4Popcorn Safe?

It goes without saying that anyone who is reading our posts on a regular...

Proxies vs VPNs – Understanding the Difference

The purpose of using both VPN and proxy servers is to conceal the users...

VPN Protocol Comparison: PPTP vs. L2TP vs. OpenVPN...

  By now it's become quite obvious that many VPN encryption...

How to Access Dropbox in China

China has been attempting to block Dropbox since 2010. However, Dropbox...

How to Access Gmail in China

The Chinese authority go to great lengths to put barriers between people...

Our Latest Blog Posts

The Best No-Log VPNs

All VPN providers must track their users’ activity and bandwidth; however, the best VPNs (the ones with a “no-logs” policy) will delete that data. Many VPN p

Read Post >>
Guy Fawkes
Oct 18, 2017

The Best VPNs for Security

If you are aware of the security threats to your data as it travels through the internet, you should use a VPN. When you connect to the internet directly,

Read Post >>
Guy Fawkes
Oct 18, 2017

Win a Year’s Subscription to a Premium VPN!

vpnMentor NordVPN Giveaway Halloween is coming up, and while we love ghosts and goblins, there is nothing scarier than getting hacked online. While

Read Post >>
Sarit Newman
Oct 16, 2017

Ransomware Attacks and How to Deal With Them

There’s a lot of talk about ransomware in the news these days. It’s surprising how few people know what it means and what happens if you get att

Read Post >>
Harsh Maurya
Oct 16, 2017

How to Watch TBS Outside of America

If you’re a fan of comedy, chances are you love TBS. One of Time Warner’s veterans, this channel has been making sure viewers get their daily dose of lau

Read Post >>
Guy Fawkes
Oct 16, 2017

ThreatMetrix – A Global Identity Network of Users, Machines, and Behaviors

When a user visits your company’s website to make a purchase or to apply for an account, how do you know that they are in fact who they claim to be? Are t

Read Post >>
Jackie Goldstein
Oct 15, 2017

The Best Kodi Addons *October 2017* That Work for Movies and TV

Kodi is an open source media center software that allows you to access and store media content such as music and videos on multiple devices

Read Post >>
Ditsa Keren
Oct 10, 2017

APMG – Providing Certification and Accreditation to Organizations and Individuals

When a company seeks certification or gain accreditation, it is imperative to find an educational institution capable of creating curriculum, courses, and

Read Post >>
Tami Kamin Meyer
Oct 10, 2017

2017’s Best VPNs for Business

In this age of global digital marketing, communicating – particularly over the Internet – is fast, convenient, and efficient. For businesses, this has led to

Read Post >>
Catherine Ablett
Oct 10, 2017

Shadowsocks vs. VPNs — Everything You Need to Know

If you have ever taken interest in the Great Firewall of China, you have probably heard of Shadowsocks. It is often mistaken for a VPN-based technology — b

Read Post >>
Ariel Hochstadt
Oct 10, 2017

How to Permanently Delete Your Gmail Account

While many would argue that Gmail is the best email platform there is, there are those who disagree. Whether it’s the promotional emails, the different l

Read Post >>
Guy Fawkes
Oct 10, 2017

How to Search Online Without Google

Google is so popular that “Googling something” is a commonly used phrase. A lot of people use Google, but not all of them know they are being tracked – from

Read Post >>
Guy Fawkes
Oct 09, 2017

2018’s Best Cheap VPNs – Great Service & Affordable

With governments across the globe increasing censorship, and everyone from the government to hackers wanting access to your data, there has never been a

Read Post >>
Catherine Ablett
Oct 09, 2017

The Best VPNs for PS4 in 2017

Whether you want some open world action of Horizon Zero Dawn or fighting fun with different players in Injustice 2, PS4 has something to satisfy all

Read Post >>
Guy Fawkes
Oct 08, 2017

2017’s Best VPNs for Linux

Why do you need a VPN for Linux? You want to be safe. Linux is safer than many other operating systems and will generally keep viruses away. But

Read Post >>
Ariel Hochstadt
Oct 08, 2017

The Best VPNs to Stay Safe from Hackers

When you connect to the internet, your data goes over an unsecured network. It can easily be monitored, recorded, altered, or stolen as it travels from

Read Post >>
Ariel Hochstadt
Oct 08, 2017

10 VPN Facts You Probably Didn’t Know

VPNs are used by many people as they are among the most reliable and trusted services that secure online privacy and personal data. Although the use of

Read Post >>
Guy Fawkes
Oct 03, 2017

Best VPNs for Online Poker

It is no secret that poker fans are some of the most passionate people out there. Their love for the game can reach great lengths — and since online poker i

Read Post >>
Guy Fawkes
Oct 02, 2017

The Best VPNs for Smart TV – Fast Speed, Cheap Price

Smart TVs are gaining popularity as they have the ability to connect to the internet. Connecting household things to one common network creates an

Read Post >>
Guy Fawkes
Oct 02, 2017

2017’s Best VPNs for iPad

While iOS is known as a secure operating system, its layer of protection has its own limits. When you connect to the internet, the security features

Read Post >>
Guy Fawkes
Oct 02, 2017
12345...10...