Real news from the privacy world

Service Update: New Servers Added

Since April 14, a number of new locations have been added to the ever-growing NordVPN server network. Here’s a quick overview of what has changed in the server list over the past few weeks! New country: Slovenia #1 New Servers: Albania #2 Australia #27-39 Austria #7-10 Belgium #3-6 Canada #89-94 Czech Republic #3-6 Finland #5-9 […]

Read more

Comcast Threatens Legal Action Against Net Neutrality Campaigners

Like other Internet service providers (ISPs), Comcast has been working hard to prove its support for net neutrality. However, the broadband industry has predominantly sided with the FCC and its Chairman Ajit Pai, whose recent decision seeks to eliminate the hard-won net neutrality protections for Internet users. In its latest move, Comcast sent a cease-and-desist […]

Read more

Keep Your Accounts Secure With Two-Factor Authentication

Passwords. If you think they are enough to protect your accounts, think again. Or even better – continue reading and learn how to use two-factor authentication everywhere you can. There’s absolutely no reason to ignore this security feature as it is by now one of the best ways to keep your accounts safe from hackers […]

Read more

FCC Votes to Begin Dismantling Net Neutrality

On Thursday (May 18), the Republican-led Federal Communications Commission (FCC) voted 2-1, along political party lines, to begin undoing a key order from the Obama era, with the goal of slackening the regulations on the Internet service industry. The Net Neutrality Debate So Far The vote initiates a rule-making process to replace the Open Internet […]

Read more

7 Tips to Make Your Social Media Profiles as Private as They Could Be

Most of us know that we need to be careful with what we share on social media. But do we have full control over what other people see? Here is how you can improve your privacy on the three of the most popular social networks: Instagram, Facebook and Twitter. There is no doubt that social […]

Read more

Looking for a VPN? 7 Review Sites to Help You Choose

Choosing a reliable VPN service that suits your individual requirements is quite difficult, especially if you have no VPN experience in the first place. The technology may seem complicated, the selection of providers dizzying, and then there’s the recent story about fraudulent VPN services popping up after the FCC privacy rules repeal last month. Naturally, […]

Read more

Intel AMT vulnerability: what you need to know

Intel AMT vulnerability

On May 1, 2017, Intel disclosed a serious flaw in its’ remote management feature: their server chipsets released since 2010 are vulnerable to unauthorized access, this way putting entire computer systems at risk of hijacking. PC users, do not freak out yet – the flaw, labeled CVE-2017-5689, was reported to affect enterprise-level computers and servers […]

Read more

7 Steps to Close Your Twitter Account Permanently

Want to quit Twitter? Social networking peer pressure and the lure of the online world can make it feel like a harsh decision. After all, Twitter is used by 330 million people every month, and losing access to its giant feed may lead to an intense fear of missing out. However, if you are longing […]

Read more

Ultrasonic Beacons: Privacy-Threatening Sound of Silence

Ultrasonic_beacons

You can’t see them, you can’t hear them, but they’re there – stealthy trackers, inaudible to human ear that capture your whereabouts without you having any idea about it. Say ‘hello’ to ultrasonic beacons! Marketers come up with more and more subtle ways to collect consumer data, even if it means covertly invading their privacy. […]

Read more

Ransomware: The Global Attack Could Have Been Prevented

Friday morning (May 12), a ransomware attack started spreading across the globe, infecting tens of thousands of computers and shutting down vital systems. Those affected included over 40 health service trusts and FedEx’s offices in the United Kingdom, a telecom in Spain, and apparently, the Russian Interior Ministry. The malicious software, transferred over email and stolen […]

Read more