Our Latest Blog Posts

Win a Year’s Subscription to a Premium VPN!

vpnMentor NordVPN Giveaway Halloween is coming up, and while we love ghosts and goblins, there is nothing scarier than getting hacked online. While you might dress up as Wonder Woman or the Joker...

Read Post >>

Data Leak research

If you took a look at this post on December 13th, you would have seen something very different. We decided to post about different IP leaks. So, why don't we have that post anymore? A few VPN

Read Post >>

How to Cancel your HideMyAss VPN Subscription and get your Money Back

 Hide My Ass VPN is a basic VPN service with limited features, offered for the same price range of some of the most renowned players in the VPN market, such as Vypr and NordVPN. If computers make you ...

Read Post >>

Say Goodbye to Website Malware with Quttera ThreatSign Antimalware

Quttera provides Website Security Solutions for Small&Medium Businesses and Organizations that provides corporate-strength protection against an evolving landscape of web malware, including viruses, t

Read Post >>

Intezer Analyzes Reused Code to Effectively Distinguish Between the Legitimate and the Malicious

Dealing with hundreds of unknown files and many false-positives, performing memory analysis, and protecting against fileless malware represent some of the biggest challenges organizations are facing t

Read Post >>

Teramind – A Fully Customizable Approach to User Behavior Monitoring and Insider Threat Prevention

With employees having access to more sensitive information than ever, companies need the ability to detect and prevent threats from inside, be they through negligence or malicious intent. However, dif

Read Post >>

Medigate is Changing the Game for Connected Medical Devices

Medigate is an israeli startup company focused on securing the safe operation of connected medical devices. These mission critical devices are changing the face of modern hospitals as we know them, bu

Read Post >>

IPVanish – Fast, Secure and Private

As privacy concerns grow, consumers are looking for solutions to keep their internet use private, secure, and unrestricted.  Virtual Private Networks (VPNs) provide an ideal solution but not all are c...

Read Post >>

Securing IoT Devices with SecuriThings

SecuriThings is a fully managed IoT security solution that monitors the ever-so-vulnerable cloud-connected IoT devices. In this fascinating interview, VP Marketing Yotam Gutman reviews the most challe

Read Post >>

BrandProtect – Detecting, Assessing and Mitigating Online Threats – Outside the Firewall

Outside the Firewall. It may sound like the next book in The Game of Thrones series, but it is very, very real and very today. It categorizes the ever-growing number of online threats which circumvent

Read Post >>

Biscom – Secure Communications

Secure communication is more important than ever as more and more data of all types, from medical records to government documents are being shared.  Bill Ho, CEO of Biscom, discusses the importance of...

Read Post >>

How to Download Trust.Zone for Windows and Use It

It’s easy to see why Trust.Zone is gaining in popularity among privacy buffs. With affordable prices, impressive connection speeds, and over 150 servers spread out around the globe, this new player on...

Read Post >>

Multi Factor Authentication Made Easy with UNLOQ.io

UNLOQ is a London-based startup that provides simple & secure multi-factor authentication, transaction authorization and data encryption for organizations that seek to comply with GDPR. We sat for a c

Read Post >>

How to Open and Install PrivateVPN in 10 Easy Steps

PrivateVPN is a popular choice among privacy enthusiasts. While PrivateVPN does not make claims about being the fastest VPN, the features on this Sweden-based VPN client are pretty remarkable. If y

Read Post >>

Hotjar.com – Monitoring User Actions, Privacy, and the GDPR

I have to say that even though I have read a lot and have spoken to many people about privacy and GDPR (General Data Protection Regulation), I don’t think that I have ever come across anyone who is as...

Read Post >>

Mobile App Policies for Companies (Includes Free Template)

Smartphones are Necessary for Work With calendars and contact lists featured on even the most basic models, smartphones have become veritable Swiss Army knives for the modern world. If used effect

Read Post >>

Border Control Can Steal Your Information: Here’s How

There’s no denying the fact we live in turbulent times. The surge in terrorism and cyberattacks, among other reasons, has led border authorities around the world to keep much tighter control over p...

Read Post >>

Holker IT – A Fresh Approach to IT Security

Holker IT is an IT consultancy firm that aims to improve clients’ businesses through strategic advice, cyber simulations, implementation and on-going support of IT systems and processes. We 've spoken...

Read Post >>

Cybertalk with IT security expert Sorin Mustaca

vpnMentor has had the privilege of talking with Sorin Mustaca, a Certified IT consultant with over 15 years of experience in IT security, and author of "Improve Your Security", a guide for the common

Read Post >>

Top 5 VPNs That don’t Keep Logs for the Privacy Seeker

Every VPN user has different needs. Those who require the highest level of anonymity and security need a VPN who does not keep logs, accepts Bitcoin for payment and operates in a VPN-friendly country.

Read Post >>
1...69 70 7172 73