Archive - February 2018

The best torrenting websites to use with CyberGhost

[ adapted after an original article written by Ulrich Brügmann on the German version of the CyberGhost blog ]

Torrents have always been a source of controversy, but this is unfortunately not a fully deserved bad reputation. Although they are best known as a means of distributing illegal content such as copyright-protected music or movies, peer-to-peer file sharing is also popular because the technology behind it has some considerable benefits.

Those who offer files through torrents thus distribute the required load of resources through a network of computers and thereby relieve the respective provider – which is why Linux files and other large types of documents are offered as torrents. Thus, instead of a single server that just goes down with new releases quickly, many individual computers take over the distribution and ensure noticeably faster download rates.

Even so, using torrents – or better, downloading files through torrents – is illegal in some countries. If not, their use is logged. Another downside: ISPs may take measures to throttle Internet speed when heavy torrent use is detected. Furthermore, they may choose to block certain torrent platforms.

Download torrents using a VPN

To avoid the above-mentioned disadvantages or unjustified warnings, it is recommended to use a good VPN for torrenting. Its purpose is to make you safe and anonymous online, but also to enable you to access regionally blocked torrent sites.

However, not all VPNs are appropriate for torrenting. Many block VPN traffic, just like regular Internet providers do, while others do not hesitate to close user accounts they suspect of P2P file sharing. This means that in spite of probably promoting the fact that they do not monitor their users’ traffic, these VPN providers actually do, otherwise how would they know the websites their users are accessing?

Read More

Ghostie’s Weekly Digest: A cyberattack disrupts the Winter Olympics ceremony and more

Hackers continue to do what they know best, whether they’re trying to steal money online or make a statement. However, there is a piece of good news, as Germany has recorded another triumph over Facebook’s policy that compels users to reveal their real name.

Read below to find out more about what happened lately in terms of online threats and vulnerabilities.

India’s digital identity database can be easily hacked

India has a national digital identity project called Aadhaar that registers and archives nationals’ financial and personal data. Reporters from The Tribune discovered a loophole as they tested the system and managed to access information regarding any Aadhaar cardholder. Due to their discovery, journalists have been accused of forgery by Indian government agencies.

More on this news.

Germany wins a fight with Facebook over users’ right to use fake names

Read More

Watch the Super Bowl 2018 with CyberGhost!

Americans are looking forward to the first biggest sports event of the year: the Super Bowl is this Sunday, February 4th. American or not, it’s almost impossible to not have heard of the incredible hysteria that goes on around this great annual sport event. Utterly advertised, with a long history and tradition, the Super Bowl is the annual championship game of the National Football League NFL.

Now, you may not be an American football fan, but the Super Bowl is an event in itself. Why? Because the Super Bowl is not all about football.

Read More

Ghostie’s Weekly Digest: Dutch spies knew Russian hackers interfered in US elections and more

A lot has happened, and secrets were revealed in the cyber security world as well over the last seven days. Here are some notable news you should be aware about:

The biggest cryptocurrency hack targeted Coincheck

Apparently, some of the predictions in terms of cyber-attacks are starting to come true. Hackers are targeting cryptocurrencies and the biggest hack has just hit Coincheck – a Tokyo-based cryptocurrency exchange. Hackers stole digital assets worth of $532 million, but it affected the entire cryptocurrency market, including the Bitcoin price.

More on the news.

CrossRAT malware hits Windows, macOS and other systems

A new malware called CrossRAT has hit Windows, macOS, Solaris and Linux systems. CrossRAT is a Trojan developed by a group called Dark Caracal, allowing hackers to handle file systems as they please and run random executables. In addition, they use social engineering posting on Facebook and sending messages on WhatsApp, encouraging users to access fake and harmful websites.

Check out more details.

Dutch spies knew that Russians hackers influenced U.S. elections

Read More

© 2017 CyberGhost