Tu IP: Sin datos · Tu estado: ProtegidoDesprotegidoSin datos

Ir al contenido principal

Cybersecurity and Privacy Research Lab

The internet was meant to be open and free. Let’s make it so.

hero research cybersecurity scientists lab md
Wired
The Huffington Post
Buzzfeed
Forbes
TEDx
Business Insider

What is cybersecurity research?

Cybersecurity research focuses on security threats, vulnerabilities, and risks related to IT systems, networks, and applications. Cybersecurity researchers aim to identify emerging threats and develop ways to prevent them.

NordVPN instantly secures the internet connection on your Mac device.

What’s the goal of NordVPN’s Cybersecurity Research Lab?

The Cybersecurity Research Lab is for educating users about cybersecurity and digital privacy. Our aim is to help internet users reclaim their digital rights, access to information, privacy, and personal data protection. We provide the tools for users globally to educate themselves on important cybersecurity-related topics.

Our expert researchers dig deep to understand current and emerging cybersecurity threats and privacy risks. The more we know about the threats we face, the more equipped we are to defend our privacy.

What does the Cybersecurity Research Lab do?

Educate

We share important information about cybersecurity and digital rights violations. Our aim is to show people the different ways their digital rights have been or might be breached.

Share

Users can access an online hub where data is presented in a way that’s easy to understand and apply in the real world.

Protect

Understanding the problem is only a part of the solution. We give people the tools and knowledge they need to protect their digital rights.

Discover new cybersecurity and privacy insights

Dive deep into NordVPN’s analysis and research.

payment card shake malware research sm

Malware shakes up the payment card market

Payment card theft puts millions of users at risk. Researchers analyzed 600,000 payment card details stolen by malware and sold on the dark web. They looked at various data points, such as when the data theft incident occurred, what type of malware was used, and what other information was stolen alongside the payment card details.

Find out more
online threats statistic sm

Everyday online threats in numbers

How many dangers are you exposed to every time you browse the internet? NordVPN’s anti-malware solution Threat Protection Pro protects users from malware, scams, malicious ads, and dangerous websites every day. Let’s take a look at the threats NordVPN users face every day.

Find out more
misfortune cookie data theft sm

Misfortune cookie? Billions of stolen cookies expose your data

Cookies keep us logged in and ensure our shopping carts remain filled while we decide what to buy. But they can also lead to identity theft, financial loss, and phishing attacks. Researchers analyzed 54 billion cookies that are for sale on the dark web to find out how they were stolen, what information they contain, and how criminals can use it for other cyberattacks.

Find out more
spy data sm

Mobile privacy: What do your apps want to know?

Your Android and iOS apps need phone permissions to function — but how much data is too much? We reviewed over a hundred popular apps around the world to see just how much they really want (and need) to know about you.

Find out more
hero woman meditating phone tracking sm

Healing or hacking? Examining the hidden cost of health apps

Health apps can help us achieve peace of mind and restore our physical health. But what role does health technology play in our digital well-being? We surveyed 12,726 users worldwide to examine the use of health management apps and the unnoticed trade-off happening in the background.

Find out more
iceberg credit card stolen research sm

Tip of the iceberg: 6M stolen cards analyzed

Thousands of stolen credit cards are bought and sold every day. To understand the risks posed by credit card theft, we analyzed a dataset of 6 million credit cards available on major dark web marketplaces — just the tip of the iceberg of credit card theft worldwide.

Find out more
shopping bag account selling bot sm

Bot markets: How hackers sell your online identity

Digital bots are becoming increasingly common. They operate in fields such as customer service, search engine optimization, and entertainment. Yet not all bots may serve good intentions – many of them can be malicious.

Find out more
money transfer hook hacking sm

How hackers can earn 17.3M USD from your data

Experts have analyzed a dark web marketplace to reveal what it can tell us about online cybersecurity risks. Our case study in collaboration with independent third-party researchers’ work may help you stay safer online and off.

Find out more
card broken steal attack sm

How thieves get payment card data

Our analysis uses data provided by independent researchers to see just how widespread payment card data theft can be. Find out how thieves can get card details without ever even stealing them.

Find out more
unlocked lock danger hacked sm

Discovering what first-time hackers want to hack

Researchers looked into the most popular searches that include the word “hack” on Google. In total, they have analyzed almost 2M (1,983,741) searches from 50 countries, both in English and the local language. Seventy percent of them (1,387,020) included Meta’s social media platforms.

Find out more
account delete social media identity clean sm

Would you delete yourself from the internet?

Most internet users have some data on the internet that they wish they could delete. However, a new NordVPN study shows that many people don’t know how to limit their online exposure. So what does the data reveal? And how can people take back control of their digital lives?

Find out more
safe social media account protected sm

Fears over social media hacking are rising: how to keep your accounts safe

Worried your social media accounts might get hacked? You’re not alone. According to a new NordVPN study, most Americans fear falling victim to social media hacking. So, should you be losing sleep over being hacked?

Find out more
risk attention exclamatory mark sm

Amazon scams pose a major threat this Prime Day

This Prime Day, millions of Amazon users are at risk of being scammed. According to new data from NordVPN, most online consumers are unable to recognize Amazon fraud — which is great news for hackers and cybercriminals and bad news for everybody else.

Find out more
risk phone shield broken unsecure sm

The brands we (shockingly) trust with our privacy

In 2021, we asked 1,022 people in the US over the age of 18 which apps, browsers, and tech brands they trusted the most as part of a nationwide survey on brand privacy. The results were depressingly predictable, proving the assumption that popularity means safety.

Find out more
gift holidays hacked hook sm

85% of holidaymakers are worried they’ll get hacked

Cancelled flights? These holidaymakers are more worried they’ll get hacked abroad. Over 85% of people in the US are scared of using public Wi-Fi on holiday. With nearly half of us going on vacation this summer, hackers have fresh targets.

Find out more
smartphone toilet paper tracking sm

Smartphone use on the toilet

Have you ever got to the bathroom, only to realize – in horror – that you don’t have your phone? You’re not the only one who needs distraction in the bathroom. Most of us take our phones with us when answering nature’s call, according to NordVPN research.

Find out more
tab nft images shopping sm

How risky are NFTs?

The hype around NFTs is very real, as exhibited by the results of our survey. We found that 47% of US respondents had some knowledge or awareness of this technology, and around half of that group had actually bought, sold or invested in NFTs previously.

Find out more
wallet money coins sm

Can you trust cryptocurrency?

NordVPN study has found 7 in 10 Americans would have concerns about the security of purchases made with cryptocurrency. They expressed unease about the prospect of cryptocurrencies becoming the standard for online purchases, along with a range of related worries.

Find out more
metaverse globe data sm

Would you join the metaverse?

Eighty-seven percent of people surveyed are concerned about how the metaverse could affect their privacy. They think it might be easy for hackers to impersonate others (50%), users’ identities won’t be legally protected (47%), and they will be forced to share even more of their private data, which can be later abused (45%).

Find out more
scissors files cut stolen sm

What would you delete from the internet?

Our research team asked people what they would erase from the internet if given a chance. From intimate messages to streaming platforms — people want to delete many things. Find out what they are.

Find out more
eye magnifying glass stalking sm

Who’s tracking you?

We surveyed 7800 people to find out how they feel about online tracking. Spoiler alert: 80% are worried about it. Find out what people from different countries think about online privacy risks.

Find out more
cookies personal information risk sm

Are cookies a privacy risk?

You might know that your lifestyle can impact your cybersecurity. But have you ever thought how much? Six people shared their real browsing data with our researchers. They collected 3,958 cookies in just two days. Learn what that means to people’s cybersecurity and what you can do to minimize cookies in your daily browsing.

Find out more
iot devices lock laptop safety sm

IoT device security

We collected survey data of over 7,000 participants to figure out why only around 25% of people secure their IoT devices. Why didn’t users take precautions when introducing a new IoT device to their homes? Whose responsibility is it to secure these devices?

Find out more
lock encryption safety protect codes sm

Laws on encryption backdoors

Many democratic governments want to implement encryption backdoors. They claim that criminals hide behind encryption to protect themselves from persecution. While the need for effective law enforcement is understandable, there is no such thing as a secure backdoor. Instead, it’s a deliberate vulnerability that anyone can discover.

Find out more
laptop eyes tracking threat binoculars sm

Device sharing and privacy

What risks do you face when you allow others to use your devices? Do your family members monitor your actions online? How safe is your private data when you use a work laptop at home? Learn why your personal devices are not as personal as you may think.

Find out more
bank account stealing sm

National Privacy Test

We launched the National Privacy Test to give internet users a chance to assess their cybersec knowledge and spot areas for improvement. In the test report, users can find country rankings by score as well as average scores in different categories and demographics.

Find out more
phone monitoring location magnifying glass sm

Parental monitoring apps

We analyzed the top 4 parental monitoring apps, their popularity trends, how they work, and what problems the increased usage of these apps might create.

Find out more
mask hacker unsafe threat sm

Wannabe hackers

Regular internet users have started looking for the best ways to hack something. We analyzed top Google search results to find which countries have the most wannabe hackers and what (or who) they targeted the most.

Find out more
block sign restrictions sm

Bypassing internet restrictions

What restricted content do internet users from different countries want to unblock the most? Government censorship, copyright laws, and local restrictions force people to look for a workaround – learn what online platforms they wanted to unblock most often.

Find out more
passwords hacked exclamation mark sm

Cyber Risk Index

We collected and analyzed data from 50 countries to determine their vulnerability to cybercrime. We wanted to find out what factors put internet users at greater cyber risk and how likely people from different parts of the world are to become victims of cybercrime.

Find out more

What types of cybersecurity research do we do?

Our researchers focus on cybersecurity topics that affect NordVPN users the most, including:

Malware research

Analyzing and understanding the behavior of different types of malware (e.g., viruses, worms, trojans, and ransomware).

Threat intelligence research

Gathering data about potential cyber threats and attackers to understand their motivations, methods, and targets.

Human factors research

Studying the role of human behavior in cybersecurity (including training, awareness, and decision making).

What research methodologies do we use?

Our researchers use various methods to uncover new insights, such as:

Survey research

Collecting aggregated data from users to gain insights about attitudes, behaviors, and perceptions related to cybersecurity.

Case study research

Analyzing specific cyberattacks, data breaches, or security incidents to understand the causes, impact, and recovery strategies.

Qualitative research

Collecting and analyzing non-numerical data, such as interview transcripts, observations, and text analysis.

Quantitative research

Collecting and analyzing numerical data like metrics, statistics, and survey responses.

NordVPN instantly secures the internet connection on your Mac device.

Who’s behind the Cybersecurity Research Lab?

NordVPN’s Cybersecurity and Privacy Research Lab is a team of experienced professionals with research and data analysis expertise. From the initial plan to the final insights – our researchers take on real digital threats and look for the best ways to banish them once and for all.

Get in touch with us

Have a suggestion? Interested in learning more? Contact us.

Frequently asked questions