Five Best VPNs for Netflix

For the first time Netflix offered DVD posting services almost 2 decades ago, in 1997. There were many changes since then. Today the Netflix’s video streaming service, which is one of the best and most common services of its kind, has almost 70 mln. subscribers worldwide. Thanks to smart branding, video subscriptions marketed by Netflix […]

, , , , , , ,

Five Best VPNs for Mac

The arrival of the newest OSX El Capitan from Apple means that from now on the Mac users have access to different kinds of engineering and visual upgrades accompanying the latest OS versions. This news was warmly welcomed by the community, but after a while it was revealed that El Capitan has some significant vulnerabilities able to endanger the security of Mac users.

, , , , , , , , , , ,

Five Best VPNs for Windows

Bearing in mind that many popular content channels are subject to regional restrictions, and the governments expand censorship and closely monitor web activities of the users, it is quite natural that lots of users utilize VPN services to ensure data privacy. There are so many VPN providers, attractive offers and smart features, that making a right choice is becoming a challenging task, especially taking in account that allusive brand names do not tell much to describe actual competitive advantages of many brands.

, , , , , , ,

Five Best VPNs for iPhone

Today smartphones are an equally common tool for internet access as PCs. That’s why is should be remembered that web privacy vulnerabilities are not less relevant when iPhones or other mobile devices are used, say, to visit web-sites or exchange data online. Good news, however, is that many options are available to ensure privacy of […]

, , , , , , , ,

Five Best VPNs for China

In the scope of the Social Credit System introduced in the PRC a while ago, moral behavior of all (over one billion) citizens of the country shall be rated according to different criteria, including the history of payments, criminal offences and web activities. The ratings shall be retained in a countrywide database and utilized to […]

, , , , , , , , , , , , , , , ,

Five Best VPNs for the UK

Historically, UK was the cradle of liberal ideas. However, today it is in the forefront of all-round online and offline surveillance, total control and censorship. Thus, we shall focus our review of the top five VPNs for the UK market on the efficient evasion of such supervision. The main conclusion is simple and straightforward: for […]

, , , , , , , , , , ,

Five Best VPNs for Android

After OpenVPN became available for Android devices, proprietary applications were developed by a number of vendors with several nice features including port forwarding, automatic reconnection and facilitated setup. As a rule, they can also be used on older devices, though in line with L2TP/IPsec which is less secure. Refer for more info to specific reviews of VPN providers.

, , , , , , ,

Five Best VPNs for the USA

Despite the declared civil liberties implying, among others, freedom of online activities and publications, the facts revealed by Edward Snowden and at WikiLeaks clearly demonstrate that each and every person is under close supervision of the state. Another aspect is tight control over copyright infringements promoted by show business. Thus, privacy concerns confirm the relevance […]

, , , , , , , , , ,

Five Best VPNs for Australia

The following legal requirement is effective from October 2015 for all communication (including telephone and ISP) providers operating in the Australian market: they are bound to collect and retain for 2 years extensive personal details related to individual internet activities, phone calls, text and e-mail messages in the local market. Some recent trends moved this […]

, , , , , ,

News and articles

The United States Now Needs To Be Part of Any Privacy Threat Model

When I was working in the European Parliament, there was one quote that stuck with me: “you’ll never see somebody’s own government listed among the threats to a customer’s privacy in their marketing material”. For all the companies out there wanting to “help” you with your own data – mail spam filters, big data processors, cloud services, and so on – there’s always a cleptocratic government lurking in the background and which is an utter and unacceptable threat to the security of that data.

SlemBunk malware for Android is stealing Bank details

Android users all over the world have been falling victims to a new type of malware that the cybersecurity firm FireEye is calling SlemBunk. The dangerous malware is a type of Trojan that (having been launched for the first time) runs in the background at all times – ready to steal the banking credentials of […]

Routing ‘Feature’ can expose VPN users’ real IP-adresses

A VPN is generally touted as an ideal tool to remain anonymous online, but this is more easily said than done. This week ProstoVPN revealed a widespread issue that can in many cases expose the true IP-addresses of users, unless proper action is taken.

Greek banks hit by cybercriminals demanding Bitcoin ransom

Banks in Greece have been hit by hackers demanding that a ransom is paid in Bitcoins. The hackers, known as the Armada Collective, are believed to have brought down the operations of three Greek banks for a number of hours last Thursday 26. In response, Greek authorities sent in a team of cyber security experts and intelligence personnel who managed to restore the system within a few hours.