Watch out for ICO scams!

We received reports that a website is using our trademark, brand name and our management and colleagues’ profiles with their current initial coin offering for the creation of a decentralized VPN powered by block-chain.

They call themselves the Vibranium Network and their website is as suspicious as you’d expect.

Robert Knapp, CyberGhost co-founder, warns: Read More

Russian Internet users cling to their privacy as Telegram ban is announced

Update, April 18th:

Just 4 days after Russia’s telecommunications watchdog banned Telegram, the organization has now blocked around 16 million IP addresses. The decision came as a response to Telegram’s move that transferred a part of its infrastructure to Amazon Web Services and Google Cloud servers.

Around 1.8 million IP addresses that belong to Amazon and Google infrastructure are now blocked.

However, Roskomnadzor’s move has led to secondary unwanted effects since it also blocked other web services including online games, mobile apps or cryptocurrency services. Read More

7 Ways to look at the Facebook – Cambridge Analytica scandal

Clearly, Facebook is living its worst time since its founding. Everywhere you turn and each webpage you open, you will see a different angle of Cambridge Analytica’s scandal in which Facebook had a leading role.

As Facebook COO, Sheryl Sandberg declared, Facebook suffered “a huge breach of trust”.

You probably realized a while back that Facebook is not just a “socializing” platform. But the backlash Facebook faces these days is clearly at one of its lowest levels.

Facebook deceived you and million others. What now?

Here is what Facebook CEO, Mark Zuckerberg said after the Cambridge Analytica scandal:

“We have a responsibility to protect your data, and if we can’t then we don’t deserve to serve you,” Zuckerberg wrote. “I’ve been working to understand exactly what happened and how to make sure this doesn’t happen again.”

Read More

The best torrenting websites to use with CyberGhost

[ adapted after an original article written by Ulrich Brügmann on the German version of the CyberGhost blog ]

Torrents have always been a source of controversy, but this is unfortunately not a fully deserved bad reputation. Although they are best known as a means of distributing illegal content such as copyright-protected music or movies, peer-to-peer file sharing is also popular because the technology behind it has some considerable benefits.

Those who offer files through torrents thus distribute the required load of resources through a network of computers and thereby relieve the respective provider – which is why Linux files and other large types of documents are offered as torrents. Thus, instead of a single server that just goes down with new releases quickly, many individual computers take over the distribution and ensure noticeably faster download rates.

Even so, using torrents – or better, downloading files through torrents – is illegal in some countries. If not, their use is logged. Another downside: ISPs may take measures to throttle Internet speed when heavy torrent use is detected. Furthermore, they may choose to block certain torrent platforms.

Download torrents using a VPN

To avoid the above-mentioned disadvantages or unjustified warnings, it is recommended to use a good VPN for torrenting. Its purpose is to make you safe and anonymous online, but also to enable you to access regionally blocked torrent sites.

However, not all VPNs are appropriate for torrenting. Many block VPN traffic, just like regular Internet providers do, while others do not hesitate to close user accounts they suspect of P2P file sharing. This means that in spite of probably promoting the fact that they do not monitor their users’ traffic, these VPN providers actually do, otherwise how would they know the websites their users are accessing?

Read More

Ghostie’s Weekly Digest: A cyberattack disrupts the Winter Olympics ceremony and more

Hackers continue to do what they know best, whether they’re trying to steal money online or make a statement. However, there is a piece of good news, as Germany has recorded another triumph over Facebook’s policy that compels users to reveal their real name.

Read below to find out more about what happened lately in terms of online threats and vulnerabilities.

India’s digital identity database can be easily hacked

India has a national digital identity project called Aadhaar that registers and archives nationals’ financial and personal data. Reporters from The Tribune discovered a loophole as they tested the system and managed to access information regarding any Aadhaar cardholder. Due to their discovery, journalists have been accused of forgery by Indian government agencies.

More on this news.

Germany wins a fight with Facebook over users’ right to use fake names

Read More

Watch the Super Bowl 2018 with CyberGhost!

Americans are looking forward to the first biggest sports event of the year: the Super Bowl is this Sunday, February 4th. American or not, it’s almost impossible to not have heard of the incredible hysteria that goes on around this great annual sport event. Utterly advertised, with a long history and tradition, the Super Bowl is the annual championship game of the National Football League NFL.

Now, you may not be an American football fan, but the Super Bowl is an event in itself. Why? Because the Super Bowl is not all about football.

Read More

Ghostie’s Weekly Digest: Dutch spies knew Russian hackers interfered in US elections and more

A lot has happened, and secrets were revealed in the cyber security world as well over the last seven days. Here are some notable news you should be aware about:

The biggest cryptocurrency hack targeted Coincheck

Apparently, some of the predictions in terms of cyber-attacks are starting to come true. Hackers are targeting cryptocurrencies and the biggest hack has just hit Coincheck – a Tokyo-based cryptocurrency exchange. Hackers stole digital assets worth of $532 million, but it affected the entire cryptocurrency market, including the Bitcoin price.

More on the news.

CrossRAT malware hits Windows, macOS and other systems

A new malware called CrossRAT has hit Windows, macOS, Solaris and Linux systems. CrossRAT is a Trojan developed by a group called Dark Caracal, allowing hackers to handle file systems as they please and run random executables. In addition, they use social engineering posting on Facebook and sending messages on WhatsApp, encouraging users to access fake and harmful websites.

Check out more details.

Dutch spies knew that Russians hackers influenced U.S. elections

Read More

© 2017 CyberGhost