Archive - October 2017

Ready to be scared? Unlock creepy Halloween movie series with Cyberghost

Happy Halloween! Or rather Scary Halloween!? If you’re the kind that enjoys a horror movie on Halloween night, after you satisfied all the trick and treaters, CyberGhost is about to surprise you with some interesting suggestions.

As you know (and if you don’t: surprise!), CyberGhost helps you unlock some popular streaming services so you can enjoy watching your favorite shows or discovering new ones.

Here is what horror and thriller TV series you can watch with CyberGhost and our cool Unlock Streaming profile:

FOX

The Exorcist

Based on the famous novel of the same name, The Exorcist tells the story of a family believed to be either haunted by evil spirits or having their souls captured by the devil. The family brings two priests into their house hoping they could bring their lives to normal. However, priests are caught in a fierce battle against an ancient force of evil.

The Purge

The story of The Purge focuses on a troubled America nation where a governing political organization decides that every year, during is a 12-hour period, any crime including murder is legal. During this time, only certain weapons are allowed to be used, while the police, fire and emergency services are not available.

SKY

Hannibal

Following the same plot as Ridley Scott’s movie from 2001, Hannibal TV series centers on the relationship between FBI special investigator Will Graham and psychiatrist Hannibal Lecter.

Read More

Implementation of ePrivacy Regulation – re-gain control over your personal data

A privacy law proposed by the European Commission is about to set a new model in terms of online privacy for people residing in Europe. The ePrivacy Regulation was initially drafted in 2002 and was revised in 2009. In the beginning of 2017, the EU updated the text and introduced new policies regarding users’ prior consent when it comes to websites and marketing companies processing and controlling their own personal data.

The updates will bring significant changes to the web surfing activity, if they are indeed accepted. The legislation still needs to be approved by the member states during a vote that will be held in a Parliament plenary session in Strasbourg next week.

These new privacy proposals align with changes suggested by the GDPR (EU General Data Protection Regulation); the organization has as main aim to make sure EU citizens enjoy online privacy and are protected from data breaches. The difference between the two is that GDPR wants to enhance Article 8 of the European Charter of Human Rights referring to personal data protection, while the ePrivacy regulation is meant to complement Article 7 of the charter in respect to a person’s private life.

The fundamental changes of the ePrivacy rules refer to:

  1. Cookies law – give your consent for web tracking

Read More

Halloween promotion – Win an iPhone X and Lifetime CyberGhost subscription

This Halloween, we’re not bothering with any tricks. Instead, we and BestVPN.com want to give away some major treats.

The grand prize? A brand new iPhone X and a lifetime VPN subscription to CyberGhost!

Check out the details below to find out how you can win.

Entering the Halloween giveaway is easy, and there are multiple ways to do it. Some of the options are worth more than one entry – the number is clearly stated alongside the option in the widget. You can enter via as many methods as you want, so there’s no reason not to up your chances of winning an iPhone X and a lifetime subscription to CyberGhost. Read more about the contest.

Beware of the Bad Rabbit new wave of ransomware

Initially, Bad Rabbit was thought to be similar to the Petya and WannaCry outbreaks that have corrupted Windows computers. However, according to researchers from Kaspersky Lab, Bad Rabbit is actually linked to the ExPetr (notPetya attacks).

The malware has hit the systems in Ukraine, Turkey and Germany, but the largest number of victims affected by the attack are from Russia. Here, three important news agencies have been attacked; Interfax, one of them, has complained their servers were deeply affected, making the company distribute their activity solely on their Facebook account.

In Ukraine, Bad Rabbit has damaged the systems of the Kiev Metro, Odessa airport, and Ukrainian ministries of infrastructure and finance.

Additionally, U.S. security experts have mentioned that they have been receiving complaints regarding malware infections in other countries around the world as well.

This is what we know about Bad Rabbit so far:

How it infects your computer

Security firm Eset has discovered the malware is spread via a bogus Adobe Flash update.

Read More

Behind closed doors – how do hackers use your personal information?

You may have been the victim of a data breach or online hack. Or you may have just heard about the bad things a risky situation such as identity theft can cause to someone. But do you know exactly what a hacker can do with your personal and financial information?

Hackers operate in different ways, but the end result is mainly the same: they would steal your information and use it in their benefit. Surprisingly enough, they are not always interested in making money; some are just so ambitious that they just want to prove a point, such as how vulnerable the online system of a big company is.

Regardless of the reasons that lie behind their actions, it’s time that you find out the possible risks you’re exposed to when a mass data breach (such as the most recent and much talked about Equifax case) occurs.

First, here is the big picture: online fraud cases similar to Equifax are the most dangerous because they would reveal the most important of your private information: social security number along with financial information (credit and debit card details, amount of your salary, etc.), plus personal information like birth date and home address. These are like wholesale candy for hackers and this information combined would make it all easier to commit frauds.

Here is what a hacker can do with your personal details such as social security number, e-mail address and/or phone number:

  1. Apply for a loan or credit card

With your social security number, a hacker can open a bank account or apply for a loan in your name. As you may guess, the moment the loan needs to be repaid, the hacker will simply consider it’s not his/her duty to do that, so you’ll start receiving calls from the bank, since your name and personal details are linked to the loan or bank account.

       2. Rent a home under your name

Read More

How net neutrality issues in the U.S. can affect us all

Update, October 23rd, 2017:

According to latest news, by November 22nd, the chairman of the FCC will give an official response regarding net neutrality. In the case of a negative comeback which will put net neutrality to an end, that would mean internet service providers will charge U.S. citizens extra for accessing certain websites, apps or even streaming services.

If you want to put a stop to the vote that approves dissolving net neutrality, you can do that by giving as many calls to the U.S. Congress members through the official battle for the net website. Mention you are in favor of net neutrality and that you demand the FCC Chairman to quit his plan.

Article originally published on September 28th, 2017

The road to digital freedom is not straight. In fact, it is full of obstacles along with a new proposal set by the United States Federal Communications Commission (FCC). The new rule is meant to put an end to net neutrality and let ISPs (Internet Service Providers) decide which online content their subscribers should have access to. Mainly, it gives them the right to promote their own services online and block their rivals.

In other words, ISPs will determine what you can see and read on the internet based on how much internet customers pay for.  So much for free speech and equal opportunities, not to mention the beginning of a censorship era in the online world.

What security specialists fear is that big companies will afford a toll given to ISPs, but small companies won’t. In a way, this is already happening. A few years ago, a news service run by Verizon banned web content regarding mass surveillance as ideas revealed in those websites opposed their interests. However, FCC’s Republican chairman Ajit Pai wants to make it all legal, even though FCC is the same authority that promised to protect net neutrality in 2015.

Why should you care about an internet freedom rule passed in the USA?

If you don’t live in the U.S., you may think this doesn’t concern you. Well, surprise! This decision will affect you too.

Read More

Overusing a new WhatsApp feature might be a risky business

WhatsApp has recently announced that it introduced a new feature called Live Location Sharing. Just to align with other apps who provide a similar feature, product manager of WhatsApp has attested that it had to be introduced in order to satisfy users’ needs. “Whether you are sharing a commute, or letting loved ones know you are safe, or meeting up with friends, these are experiences that are very common to us all.” Zafir Khan, Product Manager at WhatsApp.

Here is how WhatsApp Live Location sharing works:

  • Go to a conversation in WhatsApp (it can be an individual or group conversation).
  • Click the “attach” (paper clip) button from the message field and choose “Location”.
  • Apart from the static Location feature (the only Location option available so far) you’ll also see “Share Live Location”.

Read More

© 2017 CyberGhost