SECURITY
-
Zachary Ignoffo
8 March 2021Dark Web Price Index 2021You wouldn’t know it by watching the news, with everything that’s been happening surrounding the pandemic and global politics, but up until this point, 2020 has been one of the worst years for cyber attacks. Notable corporations and organizations like NASA, McDonald’s, Visa, MasterCard, Microsoft, T-Mobile, Lockheed Martin, Google, even cybersecurity companies FireEye and SolarWinds […]
SECURITY
-
Patricia Ruffio
23 February 2021Reducing Cybersecurity Risk for Remote Workers: An Ultimate GuideThe View from the Remote Workplace Working from home increases the risk to system security and data privacy. With this guide, remote workers and independent professionals can: Recognize and avoid basic security threats. Set up effective cybersecurity practices. Establish effective security habits.
SECURITY
-
Shanika W.
27 July 2020How to Encrypt Your Internet Connection – Complete GuideAs a regular internet user, you’ve probably heard the term encryption. Many internet users have no clue what encryption is, but it’s critical that you know why you need to encrypt your internet connection, and how you can do so. Prying eyes on the internet abound. That’s why most of the popular messaging applications, like […]
SECURITY
-
Shanika W.
21 July 2020OpenVPN over TCP vs UDP: What’s the Difference, and Which Should I Choose?If you use a VPN regularly, you probably know that almost all VPN vendors provide OpenVPN protocol because OpenVPN is a secure and reliable open-source solution. Both Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are protocols for sending data packets through the internet built on top of the Internet Protocol. They’re also the […]
SECURITY
-
Miguel Gomez
25 May 2020Dark Web Price Index 2020The dark web has a longstanding reputation as a haven for the worst kinds of criminal activity. This reputation is not wholly unjustified, as there are indeed terrible things happening around the world that can be bought and sold on the dark web. The privacy offered by software such as TOR creates an environment where […]
SECURITY
-
Miguel Gomez
23 December 2019A Comprehensive Comparison of VPNs and Onion Routing (TOR)Although VPNs have long been associated with private and secure browsing, those who have a keen interest in this particular subject may also have come across the concept of onion routing, albeit perhaps not with that exact name. Also known as Tor, onion routing (OR) has been a way to navigate the web in virtual […]
SECURITY
-
Miguel Gomez
30 November 2019Exposing The Myth of The Invulnerable Air Gapped SystemSaying that air gapping a system is anything but the most secure and invulnerable way to protect data is bound to burst some bubbles. After all, this is the gospel truth among IT professionals who live in a world of clean, sanitized, statistics that don’t always account for how dirty the real world can be. […]
SECURITY
-
Joe Robinson
23 October 2019DNS Over HTTPS: What is it? Does it protect users?The Domain Name System (DNS) is the phone book of the Internet. When people use the web, they don’t type in the IP address of the website that they want to visit. Instead, they use a domain name, like www.google.com. The job of DNS is to convert this domain name into an IP address that […]
SECURITY
-
Joe Robinson
14 October 2019Cyberwarfare statistics: A decade of geopolitical attacksThere have been almost 500 documented geopolitical cyber attacks around the world since 2009. Making cyberwarfare a major technological threat to nations and their citizens. In this article, we hope to break down some of the numbers and gain insight into the nature of these attacks, where they originate from, and who they’re targeting. Key […]
SECURITY
-
Joe Robinson
1 July 2019VPN Router vs VPN on Device – Which is Better?If you’ve read a few of our guides you’ll know how strongly we advocate the use of VPNs to protect your online privacy and break down the walls of censorship. So today we’re going to look at setting up and using a VPN on your router so you can protect every device on your home […]
SECURITY
-
Stephen Mash
29 January 2019What is a VPN Concentrator and How does it Work?The VPN Concentrator is a networking device that allows multiple VPN tunnels to use a single network. VPN tunnels are the name for a secure connection that uses advanced encryption techniques to protect the information flowing across the web. This facility allows the connection to transit across any network where it might be intercepted and […]
SECURITY
-
Stephen Mash
15 January 2019What is VPN Passthrough and How does it Work?What is a VPN passthrough? In a nutshell, a VPN passthrough is a router feature that enables any device connected to that router to establish an outbound VPN connection. By contrast, a VPN router is a device that actively implements a VPN connection. The VPN passthrough is a passive enabler for VPN traffic.
SECURITY
-
Alex Popa
9 November 2018What is TestMyNet? Is it Accurate? – Full TestMyNet ReviewTestMyNet is a free internet speed test website that’s been around for some time now. It’s very easy to use because the interface is very intuitive, although some might claim the GUI looks dated.
SECURITY
-
Elizabeth March
8 November 2018The Ultimate Parent Guide for Protecting Your Child OnlineAs parents, it is one of our many responsibilities to try to keep our children safe at all times. Technology has become of even greater importance in the lives of our children, and with the constant advancements, keeping up with what you need to know to keeps kids safe online in 2019 is more important […]
SECURITY