Tag - CyberGhost

CyberGhost VPN, currently blocked in Turkey

Ghosties, both CyberGhost app and website have been blocked in Turkey since yesterday. We are currently working to fix this problem. Until this issue is solved, you can use our Chrome and Firefox browser extensions which allow you to surf the web anonymously.

We’ll make sure to keep you updated on this matter!

Short history of internet censorship in Turkey

In Turkey, the government is in complete control of citizens’ access to online content and also of their level of digital privacy.

As an example, the Turkish government requires IPSs to keep the activity logs of all users for 2 years and these logs can be checked by the government at any time if they require. The web traffic is also filtered by the government and some websites are always blocked.

Over the years, internet censorship and freedom of speech have turned to be worse and worse. By 2017, Turkey hold the 155th position in the world based on freedom index.

Why is a VPN the optimal solution for internet freedom?

Many Turkish citizens have relied on VPNs in order to enjoy complete online freedom. By using CyberGhost VPN, you can hide your IP, connect to one of our numerous servers from over 50 countries and access basic websites such as YouTube, Facebook, etc. Plus, CyberGhost provides a secure connection and you can be sure that you’ll remain anonymous online thanks to our features, such as “Block online tracking”.

#Turkish government to #blockVPNs again!Give us a feedback or comment if you are facing with this situation Click to Tweet

Unfortunately, many VPNs including CyberGhost have been blocked by the government in the past.

We appreciate your feedback so far and if you are affected by this situation, please give us a comment and tell us more about it!

The best torrenting websites to use with CyberGhost

[ adapted after an original article written by Ulrich Brügmann on the German version of the CyberGhost blog ]

Torrents have always been a source of controversy, but this is unfortunately not a fully deserved bad reputation. Although they are best known as a means of distributing illegal content such as copyright-protected music or movies, peer-to-peer file sharing is also popular because the technology behind it has some considerable benefits.

Those who offer files through torrents thus distribute the required load of resources through a network of computers and thereby relieve the respective provider – which is why Linux files and other large types of documents are offered as torrents. Thus, instead of a single server that just goes down with new releases quickly, many individual computers take over the distribution and ensure noticeably faster download rates.

Even so, using torrents – or better, downloading files through torrents – is illegal in some countries. If not, their use is logged. Another downside: ISPs may take measures to throttle Internet speed when heavy torrent use is detected. Furthermore, they may choose to block certain torrent platforms.

Download torrents using a VPN

To avoid the above-mentioned disadvantages or unjustified warnings, it is recommended to use a good VPN for torrenting. Its purpose is to make you safe and anonymous online, but also to enable you to access regionally blocked torrent sites.

However, not all VPNs are appropriate for torrenting. Many block VPN traffic, just like regular Internet providers do, while others do not hesitate to close user accounts they suspect of P2P file sharing. This means that in spite of probably promoting the fact that they do not monitor their users’ traffic, these VPN providers actually do, otherwise how would they know the websites their users are accessing?

Read More

Watch the Super Bowl 2018 with CyberGhost!

Americans are looking forward to the first biggest sports event of the year: the Super Bowl is this Sunday, February 4th. American or not, it’s almost impossible to not have heard of the incredible hysteria that goes on around this great annual sport event. Utterly advertised, with a long history and tradition, the Super Bowl is the annual championship game of the National Football League NFL.

Now, you may not be an American football fan, but the Super Bowl is an event in itself. Why? Because the Super Bowl is not all about football.

Read More

Happy Data Privacy Day! Time to value more and protect your digital data

Interested in reading a good story? I’m up for an intriguing tale anytime. I bet you’re going to enjoy the one below because it’s a story about you.

You wake up every day, go to work, maybe have a fight with a colleague or your boss; then chat with your friends. Some nights you go out and have fun, others, you spend indoors and watch a movie. Every day is more or less the same, over and over again. But this is just the big picture and they say that details count the most; they’re the ones that make a valid story.

Your daily habits say a lot, if not everything about your personality, personal preferences and even political beliefs. And today, all these details are exposed in the digital world.

Here is how. If you have a daily routine (or at least similar) to the one bellow, maybe you should consider some useful advice:

Read More

WPA3 – the new Wi-Fi security protocol to be launched in 2018

Remember the Krack Wi-Fi vulnerability from October last year that has put all internet users to a dismay? Well, the good news is that it’s very possible we won’t have to go through that risky situation again.

Just a few days ago, during the annual CES event (one of the biggest technology and innovation shows), the Wi-Fi Alliance has announced the launch of a new wireless security protocol—Wi-Fi Protected Access WPA3 this year.

WPA3 will replace the current WPA2—the security protocol that all Wi-Fi networks have been using for over 15 years.

Why is WPA2 considered vulnerable?

The main insecurity issue of WPA2 is given by the “unencrypted” open Wi-Fi networks that makes it incredibly easy for anyone who uses the same network to access other devices.

Secondly, one of the WPA2 protocols is that the same password is used by clients and business owners when joining a Wi-Fi network (for instance the clients of a coffee shop and the owner of the coffee shop).

Due to these vulnerabilities, hackers can intercept Wi-Fi traffic and steal online data quite effortlessly.

Read More

Put privacy first in 2018 with our start-of-the-year deal

The most wonderful season of all is not over yet. You still have plenty of time to enjoy the magic of the winter holidays. You’ll probably spend most of your days in front of your laptop with a mug of hot chocolate. Maybe you have some more shopping to do or you just want to relax and watch your favorite movie series.

Regardless of your activity of choice, you surely need a friend by your side to safeguard all your digital activities. And that friend is CyberGhost VPN.

Why should you use CyberGhost every time you go online? Well, apart from the fact that the world wide web has gone a little mad and data breaches are recurrent, internet censorship is expanding. Why not kick start 2018 the right way to enjoy online privacy and browse the web without any restrictions?

With CyberGhost, you get to surf anonymously at the price of 1.99$/month. That’s right! We offer an 83% discount at our 7-year subscription plan. Quite a special offer for plenty of benefits CyberGhost VPN offers you, such as:

Read More

What are the most dangerous digital threats that lie ahead in 2018?

Most of us look to the future with optimism. Or better said, we hope for the best. That includes cyber security threats, which means we hope these will be fewer and less vulnerable. Unfortunately, though, odds are that the situation will be quite the opposite.

We don’t mean to stir any panic; we just want to get you prepared for what security specialists believe it will come.

Here are the main 5 predictions for 2018 in terms of digital threats:

  1. Takeover of chat-bots bound to draw hackers

Chat-bots have become such a thing that numerous businesses have adopted these versatile and useful tools. Think about how many websites have integrated chat-bots to schedule meetings, provide customer support and so on.

Chances are more companies will implement chatbots, but this will create a perfect medium for online hackers. They could impersonate users and compromise the bot services in phishing schemes and social engineering hacks.

  1. Rise in online travel and booking frauds

The hospitality and tourism industry are one of the largest and richest worldwide.

Read More

© 2017 CyberGhost