Blog
Botnets are enslaved computers that hackers use to hide their identities when they launch attacks. T
By Stephen Cooper in Information Security on August 24, 2018
A VPN can help ensure net neutrality, at least on an individual level. Here are our top picks for th
By Paul Bischoff in VPN & Privacy on February 18, 2021
What are the Patriot Act, Freedom Act, and FISA? Why are they dangerous? Do they really stop terrori
By Paul Bischoff in VPN & Privacy on May 15, 2020
Netflix is good at blocking users from outside Japan from accessing Japanese exclusive content. We explain how to use a VPN to securely access Netflix Japan from abroad.
By Paul Bischoff in VPN & Privacy on September 7, 2023
Getting lots of spam text messages? You're a victim of what's known as "smishing," a text message form of phishing that's getting worse every year. Read below to learn more about how smishing works and how to stop it.
By Sam Cook in Information Security on November 2, 2020
We reveal everything you need to know about Google Analytics and privacy, including the steps you ca
By Aimee O'Driscoll in VPN & Privacy on January 15, 2018
Pi-hole turns your Raspberry Pi into a DNS server that will block mobile ads on any device connected
By Aaron Phillips in VPN & Privacy on September 1, 2023
Our favorite free NZB search engines (a.k.a. NZB indexers) include Binsearch and NZBIndex. NZB index
By Paul Bischoff in VPN & Privacy on January 27, 2023
Wondering what SWATTING is? We reveal how this dangerous prank practice works and how you can protect yourself from becoming a victim. 
By Paul Bischoff in VPN & Privacy on January 27, 2023
Page 198 of 225