Our Latest Blog Posts

Axiomatics – Dynamic Authorization

Controlling access to data within organizations and beyond is critical as data becomes more important and valuable as a resource. While many solutions exis...

Read Post >>
Eytan Morgenstern
Apr 22, 2018

Critical Vulnerability Found in Majority of LG NAS Devices

Here at vpnMentor, we are concerned about your security and privacy. Our special team of hackers & researchers roam the internet to find security issues in...

Read Post >>
Sarit Newman
Apr 18, 2018

The In-Depth Guide to Bitcoin That Won’t Leave You Frustrated

Most people do not understand the concept and process of Bitcoin. Our extensive guide dives into the nitty-gritty in an easy-to-understand manner that won'...

Read Post >>
Harsh Maurya
Apr 18, 2018

What is the Dutch Intelligence and Security Services Act referendum?

What is the Dutch Intelligence and Security Services Act referendum? In March, a referendum in the Netherlands saw voters oppose a law that would give the...

Read Post >>
Martijn Grooten
Apr 17, 2018

5 Free Alternatives to OperaVPN Now That It Shut Down

OperaVPN just announced that the Android and iOS apps are shutting down on April 30th. While the free browser with the built-in VPN is still working, mo...

Read Post >>
Sarit Newman
Apr 15, 2018

Report: 50 VPNs share data on their users with Facebook

Is your VPN running the Facebook pixel, thus putting a dent in your privacy? We tested almost 300 — check out the results and see if it’s time you had a wo...

Read Post >>
Ariel Hochstadt
Apr 13, 2018

NordVPN Works in China, But Only If You Do This First

With the VPN block in China, it's getting harder to find a VPN that works. NordVPN works with its Obfuscated Servers, and we show you how to set it up....

Read Post >>
Sarit Newman
Apr 12, 2018

3 Ways to Protect Your Facebook Data from 3rd Party Apps

Are you still using Facebook? Do you feel like you can still trust the social media giant, despite all the data leaks that have occurred in the past few...

Read Post >>
Shauli Zacks
Apr 12, 2018

Actifile Data Centered Tracking Makes Outsourcing Safe

Actifile Data Security Suite is based on a cutting edge file-centric tracking, detection and prevention technology that helps organizations of all sizes to...

Read Post >>
Ditsa Keren
Apr 12, 2018

Secure Your Important Files Right at the Source with BitDam

BitDam deals with detection and prevention of advanced threats that come via email,  and is able to deal with all top-level threats, including malware, ran...

Read Post >>
Ditsa Keren
Apr 12, 2018

How to Make Chrome Incognito REALLY Private in 2018

Google Chrome is currently the most popular browser in the world. It's easy to install and use, and it loads quickly. It also stores your information as...

Read Post >>
Guy Fawkes
Apr 11, 2018

2018’s Best VPNs for Routers – Easy to Set Up and Use

Not every router works with a VPN. You need a router with DD-WRT or Tomato firmware on it, and setting it up can be frustrating. That's why we found the to...

Read Post >>
Ran Greenberg
Apr 11, 2018

Get Ready for the Gulf Information Security Expo & Conference (GISEC) in May 2018

Gulf Information Security Expo & Conference (GISEC) was launched in 2013 with the aim to bring the region’s leading cybersecurity and information security ...

Read Post >>
Ditsa Keren
Apr 11, 2018

How to Download Torrents Anonymously and Safely in 2018

BitTorrent is not a program or software, but rather a technology that facilitates lightning fast downloads and file sharing over a peer-to-peer (P2P) netwo...

Read Post >>
Sara Levavi-Eilat
Apr 10, 2018

5 of the Biggest Data Exposures Uncovered through Shodan

Shodan is an incredible tool, but it can be also used for the bad. Here are some of the remarkable discoveries found by searching through Shodan’s servers....

Read Post >>
David Bisson
Apr 10, 2018

6 Ways to Protect Yourself from the CLOUD Act

Online privacy was dealt a major blow at the end of March 2018 when the Clarifying Lawful Overseas Use of Data (CLOUD) Act was added in the near the end of...

Read Post >>
Shauli Zacks
Apr 09, 2018

Report: Only 34% of Websites in the EU are Ready for GDPR

It’s been nearly 2 years since the Council of the European Union, European Parliament and the European Union passed the privacy legislation known as the Ge...

Read Post >>
Shauli Zacks
Apr 05, 2018

2 Ways to Watch UFC Fight Night Outside of the U.S.

Fight nights are full of action and a lot of energy. If you’re in the US, you can watch it on Fox or stream it online. If you’re not in the US, you will...

Read Post >>
Guy Fawkes
Apr 02, 2018

How to Download and Install CyberGhost in 7 Easy Steps

CyberGhost is a Romanian-based VPN that managed to create a solid spot for itself among its peers by providing one of the most well-developed and diverse s...

Read Post >>
Ariel Hochstadt
Apr 02, 2018

CyberGhost Works in China, but Only If You Do This First

While China has some really great places, the main problem that travelers face is the censorship. As you might already know, China has repressive online ce...

Read Post >>
Guy Fawkes
Apr 02, 2018