Blog
Advanced persistent threats (APTs) are the most complex cyberattacks. They are generally mounted by groups linked to nation-states and target highly valuable systems and data. We explain what APTs are and how to defend against them.
By Josh Lake in Information Security on January 5, 2024
Traveling outside New Zealand but still want to stream your favorite TV shows from back home? We’ll explain how to watch New Zealand TV abroad with a VPN and we list the best VPNs for the job. 
By Mark Gill in VPN & Privacy on November 27, 2023
Want to stream, browse the web, or torrent in Kenya, without having to worry about who might be watching? With a Virtual Private Network (VPN), you can! Below, we cover the best VPNs for Kenya.
By Ian Garland in VPN & Privacy on January 23, 2024
Looking to stream Kenyan TV while abroad? Want to access your CBK or Equity online banking safely? A Virtual Private Network (VPN) can help. We explain how to get a Kenyan IP address from anywhere.
By Ian Garland in VPN & Privacy on February 8, 2024
We put a MongoDB honeypot on the web for three months to see who would attempt to view, steal, and destroy exposed data.
By Paul Bischoff in Information Security on March 15, 2022
Surveillance capitalism is here with us. Here's is what you need to know about it, and what you can do to defend your privacy and online identity.  
By Amakiri Welekwe in VPN & Privacy on July 21, 2020
Ever wondered who is more likely to be targeted by online scammers? We reveal some surprising internet safety statistics as well as easy to follow advice to protect yourself from online scams.
By Aimee O'Driscoll in Information Security on July 21, 2020
Looking to secure your internet traffic or access your usual streaming services while in Malta? We’ll explain what VPNs are, how they can help you, and which are the best VPNs for Malta.
By Ian Garland in VPN & Privacy on March 12, 2024
UFO VPN exposed millions of log files about users of its service, including their account passwords and IP addresses, despite claiming that it keeps no logs.
By Paul Bischoff in VPN & Privacy on July 21, 2020
Page 129 of 241