Category - Privacy Tips

Put privacy first in 2018 with our start-of-the-year deal

The most wonderful season of all is not over yet. You still have plenty of time to enjoy the magic of the winter holidays. You’ll probably spend most of your days in front of your laptop with a mug of hot chocolate. Maybe you have some more shopping to do or you just want to relax and watch your favorite movie series.

Regardless of your activity of choice, you surely need a friend by your side to safeguard all your digital activities. And that friend is CyberGhost VPN.

Why should you use CyberGhost every time you go online? Well, apart from the fact that the world wide web has gone a little mad and data breaches are recurrent, internet censorship is expanding. Why not kick start 2018 the right way to enjoy online privacy and browse the web without any restrictions?

With CyberGhost, you get to surf anonymously at the price of 1.99$/month. That’s right! We offer an 83% discount at our 7-year subscription plan. Quite a special offer for plenty of benefits CyberGhost VPN offers you, such as:

Read More

Are you using MacOS High Sierra? Anyone could log into your device

Protecting our personal data requires much more than simply relying on an efficient online privacy tool such as CyberGhost VPN. We always have to make sure our devices are protected with strong passwords, that our operating systems are up-to-date so that security flaws are fixed, we should try not to connect to unprotected public WiFis, only visit HTTPS websites and of course, never go online without CyberGhost VPN.

However, sometimes, these measures may not be enough. The latest version of MacOS High Sierra – 10.13.1 (17B48), released in September – has a flaw which allows people to enter the word “root” when prompted for a username, and provide no password when logging on to the device. Once someone logs in, they’ve essentially authenticated themselves as the owners of the computer. They can add administrators, change critical settings, lock out the current owner, and so on.

Bear in mind that there’s no need to do this yourself to verify it. Doing so creates a “root” account that others may be able to take advantage of if you don’t disable it.

The glitch grants anyone to access the file system for a Mac, exposing private documents on that particular device.

The bug appears to have been first noticed by Lemi Orhan Ergin, founder of Software Craftsman Turkey, who noted it publicly on Twitter.

#MacOS flaw leaves your #personaldata exposed. Find out how to stay safe! Click to Tweet

Although Mac devices are generally regarded as extra secure and less prone to hacking and malware infections, this is a major and very dangerous flaw.

Read More

Secure your online payments with CyberGhost VPN this holiday season

Update, November 22nd: and here is the great surprise! On Black Friday, you get 75% OFF on a 3-year CyberGhost VPN subscription! Connect to CyberGhost and you can enjoy anonymous and secure online activities, at the price of USD 2.75/month. Plus, you’ll get exclusive access to our NoSpy servers. The NoSpy servers are NSA-proof and guarded 24/7 in our Romanian HQ solely by the CyberGhost team. Find out more about the Black Friday offer and our NoSpy Servers.

Black Friday and Christmas holiday shopping season are approaching. Don’t you just love this time of the year? Well, so do hackers; they just can’t wait to catch you off guard and make a small mistake to get all your money (aka credit card details). In a way, it’s hacking season as well.

Since you’ll be doing online shopping more or less, you need to secure your online transactions. Apart from a few tricks you can apply to stay safe online and prevent any fraud, a VPN is actually the best tool you can use to make sure your online payments are safe and sound.

A VPN comes in handy even if you buy from previously tested online stores, but especially when shopping from a new website.

Choose CyberGhost VPN to protect your online transactions

CyberGhost VPN always safeguards your financial details including when you connect to a public or unknown Wi-Fi network or when you travel to a foreign country.

Read More

Think twice before buying gadgets that invade your privacy

Winter holidays are approaching, and you probably already started to make Santa’s list for your family members and friends. Maybe you even started to look out for bargains (after all, Black Friday is just around the corner). Speaking of the one-time a year shopping extravaganza, you should think twice before buying some awesome gadgets you think you need, even if they’re on sale.

Some of them hide some interesting tricks that are not in your benefit in terms of privacy. You may have already heard (or even experienced yourself) the downsides of incredibly good looking and smart gadgets like Alexa or Echo. These are just a few examples of gadgets that happen to look into your home, or make instant pictures without you even knowing. And you have no idea what happens with those pictures and videos and where they end up. Ok, you have a hunch where they’re going and that’s why it’s so concerning.

Here is a random list of some of the most prying gadgets and IoT (Internet of Things) tools you should avoid if you truly care about your privacy:

Toys

Edwin the Duck rubber duckie

Now, this seems a cute and harmless toy! But don’t be fooled because it’s not a normal rubber duckie (especially if you consider its price, e.g. 49 USD) although it looks like one.

Read More

Behind closed doors – how do hackers use your personal information?

You may have been the victim of a data breach or online hack. Or you may have just heard about the bad things a risky situation such as identity theft can cause to someone. But do you know exactly what a hacker can do with your personal and financial information?

Hackers operate in different ways, but the end result is mainly the same: they would steal your information and use it in their benefit. Surprisingly enough, they are not always interested in making money; some are just so ambitious that they just want to prove a point, such as how vulnerable the online system of a big company is.

Regardless of the reasons that lie behind their actions, it’s time that you find out the possible risks you’re exposed to when a mass data breach (such as the most recent and much talked about Equifax case) occurs.

First, here is the big picture: online fraud cases similar to Equifax are the most dangerous because they would reveal the most important of your private information: social security number along with financial information (credit and debit card details, amount of your salary, etc.), plus personal information like birth date and home address. These are like wholesale candy for hackers and this information combined would make it all easier to commit frauds.

Here is what a hacker can do with your personal details such as social security number, e-mail address and/or phone number:

  1. Apply for a loan or credit card

With your social security number, a hacker can open a bank account or apply for a loan in your name. As you may guess, the moment the loan needs to be repaid, the hacker will simply consider it’s not his/her duty to do that, so you’ll start receiving calls from the bank, since your name and personal details are linked to the loan or bank account.

       2. Rent a home under your name

Read More

Overusing a new WhatsApp feature might be a risky business

WhatsApp has recently announced that it introduced a new feature called Live Location Sharing. Just to align with other apps who provide a similar feature, product manager of WhatsApp has attested that it had to be introduced in order to satisfy users’ needs. “Whether you are sharing a commute, or letting loved ones know you are safe, or meeting up with friends, these are experiences that are very common to us all.” Zafir Khan, Product Manager at WhatsApp.

Here is how WhatsApp Live Location sharing works:

  • Go to a conversation in WhatsApp (it can be an individual or group conversation).
  • Click the “attach” (paper clip) button from the message field and choose “Location”.
  • Apart from the static Location feature (the only Location option available so far) you’ll also see “Share Live Location”.

Read More

Remember you have human rights on the internet too

We are living in one of the most dangerous eras in human history: we see attackers killing innocent people for no reason yet what happens probably more often, but not so obvious for everyone to see, are cyber-attacks and other online misdemeanors.

Although there is no need to panic or to constantly feel threatened and drastically change your lifestyle due to all these concerning events, some things truly need to be changed. In terms of your online behavior, you need to re-think your communication strategies and the way you use and protect your information.

The need to overcome the next generation of cyber threats

Along with the evolution of technology, new methods of digital outbreaks and violations come into force. This doesn’t mean that classical online hacks such as phishing and identity theft will go away, but they will take it to the next level along with other new hacking methods that will occur.

Read More

© 2017 CyberGhost