Category - Privacy Tips

World Wi-Fi day is here – the tech that changed our lives and our privacy

Can you imagine what it would be like to not be able to connect to a Wi-Fi network at a train station, in the airport or at a restaurant? We got accustomed to using hotspots and wireless networks the same way we look at the clock to check what time it is.

Thanks to an Australian team of engineers led by John O’Sullivan, wireless networks clearly make our lives easier.

On World Wi-Fi Day, acknowledge this great invention! But remember to use wireless networks wisely. You can easily connect to a Wi-Fi without taking any additional painstaking. But the smart Wi-Fi practice is when you first make sure your device is secured.

Why would you need a secure Wi-Fi access? Because so far, as helpful as they may be, wireless networks have proven to be the most vulnerable when it comes to data hacking.

Check out 5 true stories that reveal how easy it is to steal digital data while connected to Wi-Fi.

Read More

Protect your privacy with CyberGhost VPN while streaming the World Cup 2018

Have you been expecting the 2018 World Cup like crazy? Well, the wait is finally over!  One of the biggest sports events of the year has just started.

If you’re at home, cheering for your national team, you have it easy. All you need to do is jump in front of the TV and look for the official TV broadcaster in your country. But what if you’re travelling or living abroad? 

It’s moments like these that make you miss that feeling of being home. Our mission is to help you experience the same feeling and closeness, no matter where you are.   

How do I watch my team’s World Cup games if I’m abroad?  

Maybe you’re travelling or live outside your home country and want to hear the comments in your native language. Except for a few countries, no official broadcaster offers live streaming of the World Cup event.  

A VPN is the ultimate solution to avoid geo-blocking issues online. 

You can make that possible with the help of CyberGhost VPN. All matches will also be streamed live across a few channels. Doesn’t matter where you are! Whether it’s Argentina or New Zealand, you won’t miss any football match. 

Read More

GDPR – What’s in it for you?

Finally, a political and economic organization, namely the EU,  is introducing a complete set of regulations meant to protect your data and privacy. Because you have the right to know how and why companies, websites and social media are using your data.

In the era of almost daily data breaches, GDPR – the new data protection law, should bring us more clarity and control. Never been a victim of any data breach so far? Just to make sure, do this small experiment and type you email address(es) to the haveibeenpwed website.

Discovered something that looks like the image below?

Don’t worry! Just take a deep breath and change your passwords. Use a password manager and set very long and complex passwords. You won’t need to change them except if your password gets leaked.

Read More

The best torrenting websites to use with CyberGhost

[ adapted after an original article written by Ulrich Brügmann on the German version of the CyberGhost blog ]

Torrents have always been a source of controversy, but this is unfortunately not a fully deserved bad reputation. Although they are best known as a means of distributing illegal content such as copyright-protected music or movies, peer-to-peer file sharing is also popular because the technology behind it has some considerable benefits.

Those who offer files through torrents thus distribute the required load of resources through a network of computers and thereby relieve the respective provider – which is why Linux files and other large types of documents are offered as torrents. Thus, instead of a single server that just goes down with new releases quickly, many individual computers take over the distribution and ensure noticeably faster download rates.

Even so, using torrents – or better, downloading files through torrents – is illegal in some countries. If not, their use is logged. Another downside: ISPs may take measures to throttle Internet speed when heavy torrent use is detected. Furthermore, they may choose to block certain torrent platforms.

Download torrents using a VPN

To avoid the above-mentioned disadvantages or unjustified warnings, it is recommended to use a good VPN for torrenting. Its purpose is to make you safe and anonymous online, but also to enable you to access regionally blocked torrent sites.

However, not all VPNs are appropriate for torrenting. Many block VPN traffic, just like regular Internet providers do, while others do not hesitate to close user accounts they suspect of P2P file sharing. This means that in spite of probably promoting the fact that they do not monitor their users’ traffic, these VPN providers actually do, otherwise how would they know the websites their users are accessing?

Read More

Happy Data Privacy Day! Time to value more and protect your digital data

Interested in reading a good story? I’m up for an intriguing tale anytime. I bet you’re going to enjoy the one below because it’s a story about you.

You wake up every day, go to work, maybe have a fight with a colleague or your boss; then chat with your friends. Some nights you go out and have fun, others, you spend indoors and watch a movie. Every day is more or less the same, over and over again. But this is just the big picture and they say that details count the most; they’re the ones that make a valid story.

Your daily habits say a lot, if not everything about your personality, personal preferences and even political beliefs. And today, all these details are exposed in the digital world.

Here is how. If you have a daily routine (or at least similar) to the one bellow, maybe you should consider some useful advice:

Read More

Put privacy first in 2018 with our start-of-the-year deal

The most wonderful season of all is not over yet. You still have plenty of time to enjoy the magic of the winter holidays. You’ll probably spend most of your days in front of your laptop with a mug of hot chocolate. Maybe you have some more shopping to do or you just want to relax and watch your favorite movie series.

Regardless of your activity of choice, you surely need a friend by your side to safeguard all your digital activities. And that friend is CyberGhost VPN.

Why should you use CyberGhost every time you go online? Well, apart from the fact that the world wide web has gone a little mad and data breaches are recurrent, internet censorship is expanding. Why not kick start 2018 the right way to enjoy online privacy and browse the web without any restrictions?

With CyberGhost, you get to surf anonymously at the price of 1.99$/month. That’s right! We offer an 83% discount at our 7-year subscription plan. Quite a special offer for plenty of benefits CyberGhost VPN offers you, such as:

Read More

Are you using MacOS High Sierra? Anyone could log into your device

Protecting our personal data requires much more than simply relying on an efficient online privacy tool such as CyberGhost VPN. We always have to make sure our devices are protected with strong passwords, that our operating systems are up-to-date so that security flaws are fixed, we should try not to connect to unprotected public WiFis, only visit HTTPS websites and of course, never go online without CyberGhost VPN.

However, sometimes, these measures may not be enough. The latest version of MacOS High Sierra – 10.13.1 (17B48), released in September – has a flaw which allows people to enter the word “root” when prompted for a username, and provide no password when logging on to the device. Once someone logs in, they’ve essentially authenticated themselves as the owners of the computer. They can add administrators, change critical settings, lock out the current owner, and so on.

Bear in mind that there’s no need to do this yourself to verify it. Doing so creates a “root” account that others may be able to take advantage of if you don’t disable it.

The glitch grants anyone to access the file system for a Mac, exposing private documents on that particular device.

The bug appears to have been first noticed by Lemi Orhan Ergin, founder of Software Craftsman Turkey, who noted it publicly on Twitter.

#MacOS flaw leaves your #personaldata exposed. Find out how to stay safe! Click to Tweet

Although Mac devices are generally regarded as extra secure and less prone to hacking and malware infections, this is a major and very dangerous flaw.

Read More

© 2017 CyberGhost