Tag - security protocol

CyberGhost VPN just turned 7! But we have a million reasons to be grateful for

This month, CyberGhost VPN reaches a major milestone: 7 years of fighting for digital freedom! The entire CyberGhost team has been truly enjoying the ride.  

Because we take your privacy seriously, we’ve been working hard (and making the most of it) to make sure CyberGhost gets better and better and that it works perfectly for every single need you may have.  

Don’t worry! We still had time to make jokes around the office, save stray kittens, hold ping-pong tournaments, eat and sleep… Ok, not as much sleep when there was a team party for every occasion that deserved to be celebrated.  

We’ve already enjoyed the annual cake and champagne, but most importantly: we want to thank YOU! All Ghosties out there, from every corner of the world, thank you for putting your trust in us and for deciding to browse anonymously with CyberGhost VPN by your side. 

Read More

WPA3 ‚Äď the new Wi-Fi security protocol to be launched in 2018

Remember the Krack Wi-Fi vulnerability from October last year that has put all internet users to a dismay? Well, the good news is that it’s very possible we won’t have to go through that risky situation again.

Just a few days ago, during the annual CES event (one of the biggest technology and innovation shows), the Wi-Fi Alliance has announced the launch of a new wireless security protocol‚ÄĒWi-Fi Protected Access WPA3 this year.

WPA3 will replace the current WPA2‚ÄĒthe security protocol that all Wi-Fi networks have been using for over 15 years.

Why is WPA2 considered vulnerable?

The main insecurity issue of WPA2 is given by the “unencrypted” open Wi-Fi networks that makes it incredibly easy for anyone who uses the same network to access other devices.

Secondly, one of the WPA2 protocols is that the same password is used by clients and business owners when joining a Wi-Fi network (for instance the clients of a coffee shop and the owner of the coffee shop).

Due to these vulnerabilities, hackers can intercept Wi-Fi traffic and steal online data quite effortlessly.

Read More

© 2017 CyberGhost