Category - Privacy Tips

The best torrenting websites to use with CyberGhost

[ adapted after an original article written by Ulrich Brügmann on the German version of the CyberGhost blog ]

Torrents have always been a source of controversy, but this is unfortunately not a fully deserved bad reputation. Although they are best known as a means of distributing illegal content such as copyright-protected music or movies, peer-to-peer file sharing is also popular because the technology behind it has some considerable benefits.

Those who offer files through torrents thus distribute the required load of resources through a network of computers and thereby relieve the respective provider – which is why Linux files and other large types of documents are offered as torrents. Thus, instead of a single server that just goes down with new releases quickly, many individual computers take over the distribution and ensure noticeably faster download rates.

Even so, using torrents – or better, downloading files through torrents – is illegal in some countries. If not, their use is logged. Another downside: ISPs may take measures to throttle Internet speed when heavy torrent use is detected. Furthermore, they may choose to block certain torrent platforms.

Download torrents using a VPN

To avoid the above-mentioned disadvantages or unjustified warnings, it is recommended to use a good VPN for torrenting. Its purpose is to make you safe and anonymous online, but also to enable you to access regionally blocked torrent sites.

However, not all VPNs are appropriate for torrenting. Many block VPN traffic, just like regular Internet providers do, while others do not hesitate to close user accounts they suspect of P2P file sharing. This means that in spite of probably promoting the fact that they do not monitor their users’ traffic, these VPN providers actually do, otherwise how would they know the websites their users are accessing?

Read More

Happy Data Privacy Day! Time to value more and protect your digital data

Interested in reading a good story? I’m up for an intriguing tale anytime. I bet you’re going to enjoy the one below because it’s a story about you.

You wake up every day, go to work, maybe have a fight with a colleague or your boss; then chat with your friends. Some nights you go out and have fun, others, you spend indoors and watch a movie. Every day is more or less the same, over and over again. But this is just the big picture and they say that details count the most; they’re the ones that make a valid story.

Your daily habits say a lot, if not everything about your personality, personal preferences and even political beliefs. And today, all these details are exposed in the digital world.

Here is how. If you have a daily routine (or at least similar) to the one bellow, maybe you should consider some useful advice:

Read More

Put privacy first in 2018 with our start-of-the-year deal

The most wonderful season of all is not over yet. You still have plenty of time to enjoy the magic of the winter holidays. You’ll probably spend most of your days in front of your laptop with a mug of hot chocolate. Maybe you have some more shopping to do or you just want to relax and watch your favorite movie series.

Regardless of your activity of choice, you surely need a friend by your side to safeguard all your digital activities. And that friend is CyberGhost VPN.

Why should you use CyberGhost every time you go online? Well, apart from the fact that the world wide web has gone a little mad and data breaches are recurrent, internet censorship is expanding. Why not kick start 2018 the right way to enjoy online privacy and browse the web without any restrictions?

With CyberGhost, you get to surf anonymously at the price of 1.99$/month. That’s right! We offer an 83% discount at our 7-year subscription plan. Quite a special offer for plenty of benefits CyberGhost VPN offers you, such as:

Read More

Are you using MacOS High Sierra? Anyone could log into your device

Protecting our personal data requires much more than simply relying on an efficient online privacy tool such as CyberGhost VPN. We always have to make sure our devices are protected with strong passwords, that our operating systems are up-to-date so that security flaws are fixed, we should try not to connect to unprotected public WiFis, only visit HTTPS websites and of course, never go online without CyberGhost VPN.

However, sometimes, these measures may not be enough. The latest version of MacOS High Sierra – 10.13.1 (17B48), released in September – has a flaw which allows people to enter the word “root” when prompted for a username, and provide no password when logging on to the device. Once someone logs in, they’ve essentially authenticated themselves as the owners of the computer. They can add administrators, change critical settings, lock out the current owner, and so on.

Bear in mind that there’s no need to do this yourself to verify it. Doing so creates a “root” account that others may be able to take advantage of if you don’t disable it.

The glitch grants anyone to access the file system for a Mac, exposing private documents on that particular device.

The bug appears to have been first noticed by Lemi Orhan Ergin, founder of Software Craftsman Turkey, who noted it publicly on Twitter.

#MacOS flaw leaves your #personaldata exposed. Find out how to stay safe! Click to Tweet

Although Mac devices are generally regarded as extra secure and less prone to hacking and malware infections, this is a major and very dangerous flaw.

Read More

Secure your online payments with CyberGhost VPN this holiday season

Update, November 22nd: and here is the great surprise! On Black Friday, you get 75% OFF on a 3-year CyberGhost VPN subscription! Connect to CyberGhost and you can enjoy anonymous and secure online activities, at the price of USD 2.75/month. Plus, you’ll get exclusive access to our NoSpy servers. The NoSpy servers are NSA-proof and guarded 24/7 in our Romanian HQ solely by the CyberGhost team. Find out more about the Black Friday offer and our NoSpy Servers.

Black Friday and Christmas holiday shopping season are approaching. Don’t you just love this time of the year? Well, so do hackers; they just can’t wait to catch you off guard and make a small mistake to get all your money (aka credit card details). In a way, it’s hacking season as well.

Since you’ll be doing online shopping more or less, you need to secure your online transactions. Apart from a few tricks you can apply to stay safe online and prevent any fraud, a VPN is actually the best tool you can use to make sure your online payments are safe and sound.

A VPN comes in handy even if you buy from previously tested online stores, but especially when shopping from a new website.

Choose CyberGhost VPN to protect your online transactions

CyberGhost VPN always safeguards your financial details including when you connect to a public or unknown Wi-Fi network or when you travel to a foreign country.

Read More

Think twice before buying gadgets that invade your privacy

Winter holidays are approaching, and you probably already started to make Santa’s list for your family members and friends. Maybe you even started to look out for bargains (after all, Black Friday is just around the corner). Speaking of the one-time a year shopping extravaganza, you should think twice before buying some awesome gadgets you think you need, even if they’re on sale.

Some of them hide some interesting tricks that are not in your benefit in terms of privacy. You may have already heard (or even experienced yourself) the downsides of incredibly good looking and smart gadgets like Alexa or Echo. These are just a few examples of gadgets that happen to look into your home, or make instant pictures without you even knowing. And you have no idea what happens with those pictures and videos and where they end up. Ok, you have a hunch where they’re going and that’s why it’s so concerning.

Here is a random list of some of the most prying gadgets and IoT (Internet of Things) tools you should avoid if you truly care about your privacy:


Edwin the Duck rubber duckie

Now, this seems a cute and harmless toy! But don’t be fooled because it’s not a normal rubber duckie (especially if you consider its price, e.g. 49 USD) although it looks like one.

Read More

Behind closed doors – how do hackers use your personal information?

You may have been the victim of a data breach or online hack. Or you may have just heard about the bad things a risky situation such as identity theft can cause to someone. But do you know exactly what a hacker can do with your personal and financial information?

Hackers operate in different ways, but the end result is mainly the same: they would steal your information and use it in their benefit. Surprisingly enough, they are not always interested in making money; some are just so ambitious that they just want to prove a point, such as how vulnerable the online system of a big company is.

Regardless of the reasons that lie behind their actions, it’s time that you find out the possible risks you’re exposed to when a mass data breach (such as the most recent and much talked about Equifax case) occurs.

First, here is the big picture: online fraud cases similar to Equifax are the most dangerous because they would reveal the most important of your private information: social security number along with financial information (credit and debit card details, amount of your salary, etc.), plus personal information like birth date and home address. These are like wholesale candy for hackers and this information combined would make it all easier to commit frauds.

Here is what a hacker can do with your personal details such as social security number, e-mail address and/or phone number:

  1. Apply for a loan or credit card

With your social security number, a hacker can open a bank account or apply for a loan in your name. As you may guess, the moment the loan needs to be repaid, the hacker will simply consider it’s not his/her duty to do that, so you’ll start receiving calls from the bank, since your name and personal details are linked to the loan or bank account.

       2. Rent a home under your name

Read More

© 2017 CyberGhost