Our Latest Blog Posts

Interview with TheSafety.US about VPNs

Please provide some background on the company: what inspired you to start a VPN service and how did it come together? We started our business in 2006. Back then, VPNs were used by private companies t...

Read Post >>
Ditsa Keren
6th February 2020

The Hacker Playbook 2: Practical Guide To Penetration Testing – Free Chapter Included

Peter Kim describes himself as heavily involved in the security community. He's spent the last ten years working as a penetration tester and incident responder for a variety of business sectors. On hi...

Read Post >>
Ditsa Keren
6th February 2020

How to Watch the World Cup Final for FREE France vs Croatia

This year’s FIFA World Cup came with many surprises, but the game that we all want to watch is finally here: the final match. After Croatia's win against England on Wednesday, France will take on C...

Read Post >>
Sarit Newman
6th February 2020

Secure Channels – Data Protection through Authentication and Encryption

With personal data fetching high prices on the dark web, the Internet of Things creating additional, potentially vulnerable access points to networks, and human fallibility, hackers have more reasons ...

Read Post >>
Gail Lobel Rand
6th February 2020

Free chapter of Firewalls Don’t Stop Dragons- A Step by Step Guide to Computer Security For Non-Techies

Carey parker, the author of Firewalls Don’t Stop Dragons- A Step by Step Guide to Computer Security For Non-Techies has been a software engineer for about 24 years, and the informal 'IT guy' for his f...

Read Post >>
Ditsa Keren
6th February 2020

5 of the Biggest Data Exposures Uncovered through Shodan

Shodan is an incredible tool, but it can be also used for the bad. Here are some of the remarkable discoveries found by searching through Shodan’s servers....

Read Post >>
David Bisson
6th February 2020

ProtonMail Review & Test (2020): Is it Really Worth Your Money?

How safe are the e-mails you send to colleagues and friends? In a sense, the content of your e-mail messages is always being monitored. ProtonMail was designed to keep user content beyond the reach of...

Read Post >>
Ariel Hochstadt
6th February 2020

Don’t Miss These 20 Leading Innovators at Cyber Week 2018

The biggest names in cybersecurity are getting together in Tel Aviv, Israel from June 17th - June 22nd at the Tel Aviv University. Cyber Week has grown into one of the top annual cybersecurity even...

Read Post >>
Ariel Hochstadt
6th February 2020

BeyondTrust – Making Sure Users Don’t Abuse Their Privileged Access Permissions

BeyondTrust is convinced that the greatest cause of enterprise data breaches is the fact that users abuse the privileged level of access permission given to them, i.e. admin or root access. Sometimes ...

Read Post >>
Jackie Goldstein
6th February 2020

Mr Deepak Maheshwari’s Presentations in IEEE forum – CyberWeek 2020

Mr Deepak Maheshwari, Director, Government Affairs, India & ASEAN, Symantec, presented in the IEEE forum in TAU CyberWeek 2016. He was kind enough to share his presentations with us....

Read Post >>
Ariel Hochstadt
6th February 2020

The Impact of the New Rule 41 on VPN Users

Rules governing how U.S. law enforcement can conduct electronic searches and mass surveillance are on the brink of change. Privacy advocates see many red flags and are speaking out in a last-ditch eff...

Read Post >>
John Norris
6th February 2020

How To Change Your Location in Pokemon GO [Super Easy Hack]

Pokemon GO players living in rural areas are at a disadvantage compared to people living in cities and suburbs. If you live in a rural area, you'll have fewer Pokemon, Gyms, and Pokestops at your disp...

Read Post >>
Ariel Hochstadt
6th February 2020

5 Best Showbox Alternatives | Updated List for 2020

Due to pressure from movie studios and television producers, Showbox has been effectively banned in several parts of the world. The free torrenting service had been targeted for intellectual property ...

Read Post >>
Ariel Hochstadt
6th February 2020

Report: Popular Online Retailer Exposes Customers in Worldwide Data Leak

Led by cybersecurity analysts Noam Rotem and Ran Locar, vpnMentor's research team discovered a leak in a database belonging to the online retailer LightInTheBox. A massive database, it contained over ...

Read Post >>
Guy Fawkes
6th February 2020

Interview with Online Privacy Experts Mr. Sudhanshu Chauhan and Mr. Nutan Kumar Panda. Authors of “Hacking Web Intelligence”

We sat down with Mr. Sudhanshu Chauhan and Mr. Nutan Kumar Panda, authors of the book “Hacking Web Intelligence,” to discuss how an average user can keep their data secure in an ever-changing digital ...

Read Post >>
Ariel Hochstadt
6th February 2020

Can VPNs Be Hacked? We Did The Research, Here’s the 2020 Guide

People often wonder if VPNs allow room for hackers to exploit or break them. Find the definitive answer to this question with our in-depth analysis....

Read Post >>
Guy Fawkes
6th February 2020

Wombat Security Technologies – Security Training to Change Behavior

While there is no question in anyone’s mind that companies must provide increased amount of security training to their employees, it is not always obvious what is the best way to do that. In this inte...

Read Post >>
Jackie Goldstein
6th February 2020

Get Ready for Hack in the Box 2020 Conference in Amsterdam

This April in Amsterdam, get ready to expand your knowledge with extraordinary lectures, training sessions and live demos from non-biased security researchers and professional hackers. We've spoken to...

Read Post >>
Ditsa Keren
6th February 2020

Coronet – Allowing You to Safely Use Any Wi-Fi or Cellular Network

Let’s be honest – how many of us think about security risks as we race into a coffee shop to check our email or the latest sports scores? Unfortunately, there are a lot of bad guys out there who know ...

Read Post >>
Jackie Goldstein
6th February 2020

How to Pay Anonymously. Anonymous Payment Methods Explained

If you're interested in keeping your exposure to a minimum while dealing online, this one's for you. Learn the pros and cons of anon payment methods with our guide!...

Read Post >>
Daniel Krohn
6th February 2020
1...8 9 1011 12 ...70