Tag - privacy

Get €25.000 funding for your privacy start-up idea from CyberGhost!

Privacy Accelerator

As you surely know by now, we really, strongly support and fight for online privacy, security, and freedom.

We say it on our website, our CEO Robert Knapp never misses a chance to say it during interviews, and everything we do is based on our belief that online privacy is a basic human right not to be ignored or infringed on.

So this year we decided to put our money where our mouth is. Literally.

On July 15, we kicked off our Privacy Accelerator Program, which aims to invest in, mentor, and support early-stage tech start-ups focused on privacy, security, or freedom.

We will invest a total amount of €100.000 in 4 up-and-coming teams/companies that are fighting the good fight and want to protect netizens’ rights to privacy, security, and anonymity.

We’ll also provide them with office space and, if they’re not from the EU, we’ll accommodate them in our guesthouse, which is located smack-dab in the always vibrant center of Bucharest.

And to top it all off, we’ll give them access to our API and make sure they’re mentored by our internal experts in development, sales, marketing, and customer support and administration.

Sounds awesome, right?

Then wait no longer and get your privacy start-up idea funded by sending in your application to press.office@cyberghost.ro.

The deadline is September 1st, so hurry up!

For more info about the Privacy Accelerator Program, click here.

BestVPN Independence Day Competition

Our friends from Best VPN relaunched their website this weekend, on 4th of July.To mark this event they organized a competition, Independence Day Competition, together with a number of VPN providers, including CyberGhost.

1200x627_v1

Since CyberGhost stands for privacy and freedom, we decided to join this competition, and offer a celebrating discount of 50%.

If you enter Best VPN’s competition you have the chance to win a 13″ MacBook Air, or 5 Premium VPN accounts, including one from CyberGhost. You can find more details about the competition here.

Good luck everyone!

Full proof – 'Regin' Trojan is an NSA Tool

If the world really needed more proof to realise the scale on which the NSA machinery operates, a new and irrefutable proof was released today.

On January 17 2015, Spiegel.de published an article based on documents obtained from Edward Snowden and provided a copy of a malicious program named “QWERTY” ), supposedly used by several governments in their Computer Network Exploitation (CNE)operations.

Today, the same news publication released an article, demonstating the same code provenience and indentical  functionality of  “QWERTY” malware to the Regin 50251 plugin.

Regin/Querty Vergleich Kaspersky

 

Given the fact that the QWERTY keylogger doesn’t function as a stand-alone module, only in tandem with kernel hooking functions provided by the Regin module 50225, it was concluded that the QWERTY malware developers and the Regin developers are the same or working together.

You can read here all the mind-binding conclusions of this ground breaking analysis that states once again that mass-surveillance is more than a fact, it’s a threat.

5 Tips For Preserving Your Online Privacy While Traveling for Holidays

It’s the season to be jolly! And travel. A lot.

Right now, most of you are probably making plans to escape the concrete jungle and head on to a city break somewhere quieter or to go see your family and friends.

However, there are a few important measures you should take in order to fully enjoy your holidays without getting your bank details stolen, accounts hacked, or house ravaged.

xmas

  1. Don’t Show And Tell

No matter how tempting it is to brag about your perfectly planned vacation in an exotic destination, it’s never a good idea.

There are a lot of people out there, who can’t wait to break into an empty house and won’t leave empty handed either, while they’re at it.

So keep that in mind next time you’re traveling! Those awesome Instagram photos can wait a few days.

Speaking of which…

  1. Check Your Privacy Settings Before Uploading Photos

Don’t even think to share that photo with you holding three shots in one hand, before checking who can actually see it.

Sure, your friends will think it’s funny, your exes will turn grey with envy and your mom might get slightly worried.

Your current and future employers, work colleagues or people who don’t know you so well yet, will never see you with the same eyes again.

  1. Secure Payment Methods Are Your Friend

No matter how much you’re trying to escape your daily duties, it’s inevitable that at some point you might need to pay those bills that keep piling up.

In that case, make sure you always use a secure payment method, like bitcoin (if it’s accepted), or Secure Pay.

But even that is not helpful if you don’t…

  1. Use Strong Passwords For Everything

You might be tempted to use 1234 or your dog’s name as a password, but that is a huge mistake pretty much everyone comes to regret at some point. The only way you can make it worse is by having one password for all your accounts.

Regardless of the time and energy you think you’re saving, all you do is preparing yourself for sharing with the world a tad more than you’re willing and ready to.

Strong passwords should have at least 8 characters, contain big and small letters, special characters and numbers.

And if you think you won’t remember them all, you’re probably right. That’s why a password manager like KeePass always comes in handy.

Tip 005 - Choose Complex Passwords - Not a Vocabulary Word

  1. Beware of WiFi Networks And Encrypt Your Connection

Last, but not least, it’s important you remember to encrypt your internet connection whenever you use public HotSpots, which you will be doing a lot.

The simplest and most efficient way to do this, is by using a VPN.

CyberGhost VPN encrypts your traffic and changes your IP so you can surf anonymously and safe.

And you’re in luck! We have a great offer, too!

Encryption – A Guide for Everyone

Did you know that even the great Caesar used a cipher to hide his military
correspondence between 100 – 44 B.C?  The key in this case was simply
to shift to the right by three.

Encryption is not a new concept but it keeps getting more and more complex and useful. We thought that a guide to encryption accessible to everyone would be more than welcomed, either to understand it better or to share it with people who would need it.

Just a short intro: encryption is the process through which information or data is transformed (encoded) in such a way that is unreadable to anyone who does not have the knowledge of the way it was transformed.
The information thus becomes available only to the authorized parties. This authorization works based on keys. Encoding the information is made by using an encryption key while decoding the information is made by using a decryption key.

Encryption

You can read the entire guide here.

Feel free to share it with people interested.

New Servers in 2 Locations

Update: 9 New Free CyberGhost Servers! You now have more Free servers in UK, 4 in London more precisely, and in France, 5 in Paris. We told you we’re fast 🙂

It’s official! We’ve added 7 more Free servers in Bucharest, Romania and 4 Premium servers in New York for a safe and private internet experience.

Feel free to try them and share your feedback with us.

proxy cg

 

Click here to find them > Server Overview <

If you haven’t seen our Indiegogo campaign, now it’s the time. Check it our and help us build the #NoSpyProxy!

Stop Pointing Your Finger at Jennifer Lawrence and Accept You Might Be Next

superbwallpapers.com

superbwallpapers.com

This week’s incident is on everybody’s lips. You most probably know what we’re talking about, but in case you’ve been stranded on a desert island for the past couple of days, let me sum it up for you: the internet was overwhelmed by the nude photos of celebrities like Jenifer Lawrence, Rihanna, Kate Uptown and at least a dozen of other female stars. Their iCloud accounts have supposedly been hacked, and while there are heated discussions and countless speculations on how it was done, the only conclusion you need to draw from this is that it can happen to you, too.

How did this happen?

It is very possible that we will never know, but here are a few possibilities:

  1. Password reset (secret questions / answers)

While sincerity is usually encouraged and makes for a valuable quality in a friend or business partner, providing the true answers to your security questions, while setting up your account, might not be the most intelligent move, especially if they’re the only thing you rely on for recovering your passwords.

ID-10054806

Hopefully not you

2.  Phishing emails

Phishing email messages are used by hackers for stealing money or your personal information. The good news is it’s really easy to spot one if you always remember to check for bad grammar, links in text (those shalt not be clicked), and threats (ex.: your account will be deleted if you don’t reply).

3. Social engineering / RAT install / authentication

Remote Access Tools are pieces of software used to remotely access or control a computer. While it can be of great use for system administrators or that guy who always fixes your computer, it can also be used to perform key logging, screen and camera capture, file access, code execution, registry management etc.

You should verify every program before installing it on your computer by using authorized program signatures.

A few easy things you can do to make sure you won’t be next

  • Don t use  the same password for all your accounts

For all you might know, your password “qwerty”, “12345” or the ever popular “password” is working just fine for your Faceboook, Pinterest, Mail, Amazon & co.

Maybe you know better than that and use a complicated password with symbols and numbers. Congratulations! The thing is, even if that’s the case you shouldn’t use it for all your accounts because that is like giving somebody the skeleton key to your life.

It would be ideal to go through the trouble of setting up different complicated passwords for all your accounts, which in fact, it’s not hard to manage if you…

  • Use a password manager

Keepass, Lastpass 1.72  and Kaspersky Password Manager 4, are all great options, are easy to use and fast to install. 5 minutes is a small price to pay for your peace of mind.

  • Use two step verification

Most of the major sites offer this so just remember to check.

  • Turn off automatic backups

Most of the cloud based services such as Google’s accounts or iCloud automatically sync every photo you take, contact you save, app you download or website you access.While you would rather have everything in one place in case you ever lose your phone or tablet, it’s better to turn it off.

It is , in the end, about comfort versus security and we live in an age when the most valuable things we own aren’t palpable. You know what they say: Better be safe than sorry!

Do you use any other methods? Sharing is caring so let us know in the comment section below!

 

© 2017 CyberGhost