Covert Redirect logo

Covert Redirect: Definitely NOT The New Heartbleed

News organizations reporting on it, a fancy looking website (ok, not as pretty as Heartbleed), a sexy logo, and blog posts a plenty saying that the online sky is falling is having many thinking that the OpenID and OAuth flaws, known as Covert Redirect, are the new HeartBleed.

Where Heartbleed was a genuine security flaw that jeopardized the personal information of approximately everyone who goes online, the Covert Redirect flaw is one that has been known about and dealt with already.

Continue Reading

Hulu blocking VPNs and our Top 3 Providers

UPDATE: Hulu has blocked all VPN providers we have tested. They do play whack-a-mole with some, but your best hope to enjoy the content they had available is by using a VPN which allows torrenting, choose great torrent software, and use one of the best websites for torrent file location.

There are two main reasons why people use a VPN:

  1. Privacy
  2. Getting around geo-blocking

The first point is always a concern, the second is usually just a bonus. Hulu has reportedly started blocking VPN services who attempt to gain access to Hulu through known VPN IPs. You will see a screen that looks something like this:

hulu blocking vpns screen message

Continue Reading

protect your online data

Protect Your Online Data With These 5 Easy to Follow Tips

Hackers, corporations, and government agencies have a hundred different ways to steal your online data. Your computer has open doors all over, just begging someone to walk right through it – findings ways to protect your online data is more important than ever.

When it comes to protecting your online data, your job is to go around and close as many of those doors as possible. I was reading a recent article over on esecurityplanet.com which stated that 88 percent of surveyed web users are at least “a little” concerned about the data that they have online. This article will look at helping you get out of that mass of confused people, and get your data secure.

Continue Reading

The Heartbleed Bug and our Top 3 VPNs

The Heartbleed bug absolutely put the internet security world in its ear. To quote internet security expert Bruce Schneier on the Heartbleed bug:

‘Catastrophic’ is the right word. On the scale of 1 to 10, this is an 11.”

That’s right, the Heartbleed bug went Spinal Tap. Is that too dated a reference?

Continue Reading

online activist

How do Online Activists Benefit From a VPN?

Many people falsely believed that the only threat they face online is a hacker or a computer virus. This turned out to not be the case as governments the world over have been found to be using the Internet to track people’s information and do mass surveillance. You can be sure that they’re following the activity of online activists, especially in more restrictive countries. Do not fool yourself, these restrictive countries can include both the UK and the USA.

Even the most common of online activist activities can be tracked and used against you if you don’t protect yourself. This is where a VPN service comes in handy.
Continue Reading

internet security myths

Internet Security Myths, Misinformation, the NSA and Encryption

Internet security myths have gone through the roof recently. I even recently read an article on another website, that I won’t name because I’d rather not start a flame war, which took these myths and made them ‘facts.’ The most maddening thing was that the article had no back-up proof or references about the claims it made.

I’m going to look at a few points made in this other article as it will address a few common VPN facts, internet security myths and spying myths that are floating around out there.

Continue Reading

Fake WAP

The Hacker Ninja Attack That a VPN Can Save You From

There are a myriad of things out there that goes under the overall name ‘hacking.’ But what exactly are these acts and what is the absolutely easiest one for hackers to accomplish?

This is a stealth attack, like a deadly ninja, known as a fake wireless access point (Fake WAP). You may also know it as a ‘man in the middle’ attack. Hackers can do this easily enough, stealing your data secretly so that you’re none the wiser. Worse yet, you’ll HELP them do it! A VPN is your key to making sure this doesn’t happen to you, even if you do fall into their trap.
Continue Reading

world map

How do I Get Around Geo-blocking? The Artful Geo-Dodger

If you’ve never vacationed further from home than L.A. or New York, you’ve likely never experienced geo-blocking before. If, however, you’re like me and you travel all over (or worse: you’re Canadian) you have been met by a screen that looks like the image after the break at some point:
Continue Reading

how does a vpn work

How Does a VPN Work to Protect Privacy?

VPNs are the hot technology out there for those that are concerned about their online privacy. With all of the risks out there, such as hackers, the NSA and your own browser, looking to take your information it is risky to not use a VPN of some sort.

Knowing they work is great, but knowing how they work can help you determine that they are right for you and that you need one. We’ll look at how they work, what they’re superior to and how they could impact your internet speed.

Continue Reading

mobile vpn

Mobile VPN Technology – Now for Your Tablet and Smartphone

People have long associated VPN technology use with their laptop. This makes sense as people have been carrying their laptops with them all over since they were first introduced. This meant using other people’s WiFi at the local coffee shop, a different office or any other public hotspot.

Continue Reading