Five Best VPNs for Mac

The arrival of the newest OSX El Capitan from Apple means that from now on the Mac users have access to different kinds of engineering and visual upgrades accompanying the latest OS versions. This news was warmly welcomed by the community, but after a while it was revealed that El Capitan has some significant vulnerabilities able to endanger the security of Mac users.

, , , , , , , , , , ,

Five Best VPNs for Windows

Bearing in mind that many popular content channels are subject to regional restrictions, and the governments expand censorship and closely monitor web activities of the users, it is quite natural that lots of users utilize VPN services to ensure data privacy. There are so many VPN providers, attractive offers and smart features, that making a right choice is becoming a challenging task, especially taking in account that allusive brand names do not tell much to describe actual competitive advantages of many brands.

, , , , , , ,

Five Best VPNs for iPhone

Today smartphones are an equally common tool for internet access as PCs. That’s why is should be remembered that web privacy vulnerabilities are not less relevant when iPhones or other mobile devices are used, say, to visit web-sites or exchange data online. Good news, however, is that many options are available to ensure privacy of […]

, , , , , , , ,

Five Best VPNs for Android

After OpenVPN became available for Android devices, proprietary applications were developed by a number of vendors with several nice features including port forwarding, automatic reconnection and facilitated setup. As a rule, they can also be used on older devices, though in line with L2TP/IPsec which is less secure. Refer for more info to specific reviews of VPN providers.

, , , , , , ,

Five Best VPNs for Australia

The following legal requirement is effective from October 2015 for all communication (including telephone and ISP) providers operating in the Australian market: they are bound to collect and retain for 2 years extensive personal details related to individual internet activities, phone calls, text and e-mail messages in the local market. Some recent trends moved this […]

, , , , , ,

News and articles

The United States Now Needs To Be Part of Any Privacy Threat Model

When I was working in the European Parliament, there was one quote that stuck with me: “you’ll never see somebody’s own government listed among the threats to a customer’s privacy in their marketing material”. For all the companies out there wanting to “help” you with your own data – mail spam filters, big data processors, cloud services, and so on – there’s always a cleptocratic government lurking in the background and which is an utter and unacceptable threat to the security of that data.

SlemBunk malware for Android is stealing Bank details

Android users all over the world have been falling victims to a new type of malware that the cybersecurity firm FireEye is calling SlemBunk. The dangerous malware is a type of Trojan that (having been launched for the first time) runs in the background at all times – ready to steal the banking credentials of […]

Routing ‘Feature’ can expose VPN users’ real IP-adresses

A VPN is generally touted as an ideal tool to remain anonymous online, but this is more easily said than done. This week ProstoVPN revealed a widespread issue that can in many cases expose the true IP-addresses of users, unless proper action is taken.

Greek banks hit by cybercriminals demanding Bitcoin ransom

Banks in Greece have been hit by hackers demanding that a ransom is paid in Bitcoins. The hackers, known as the Armada Collective, are believed to have brought down the operations of three Greek banks for a number of hours last Thursday 26. In response, Greek authorities sent in a team of cyber security experts and intelligence personnel who managed to restore the system within a few hours.