1. blog/
  2. News and Updates
  3. (Page 4)

New iOS app update: Version 4.1.0 build 331

Robert Knight – Author of articles September 8, 2023

Our latest iOS client contains fixes and improvements to make your VPN connection faster, more secure, and more stable. Important changes: Added FAQ and Support…

Work from Home? Microsoft Edge V84 is a good reason to Ditch Chrome

Satoshi Naki – Author of articles December 2, 2022

  After a long journey of Microsoft internet explorer and less welcoming to the initial MS Edge web browser version, Microsoft is now curious to…

Insulting comments in Instagram

Robert Knight – Author of articles August 20, 2021

Earlier this year one of the most popular Instagram applications launched a new feature. Its main task is to analyze written comments and warn the…

New tools to improve data security

Satoshi Naki – Author of articles July 22, 2021

The human factor has been and remains the “Achilles heel” of data hacking. Multi-factor authentication can be an important step towards establishing digital identity control…

WhatsApp refused to Hand over Data to Authorities of Hong Kong

Robert Knight – Author of articles November 16, 2020

A proxy war that has been initiated in Hongkong for freedom of expression over the internet. Hong Kong government officially requested to WhatsApp provides them…

A novel malware can steal passwords from VPN software and web browsers

Robert Knight – Author of articles August 12, 2020

Malware is designed to harm computers, clients, and network systems, etc. A new malware Agent Tesla has been updated with novel stealing modules. According to…

Three US and UK teenagers arrested due to their link with the Twitter hack

Robert Knight – Author of articles August 12, 2020

It was easy for law enforcement agencies to trace and identify the culprits behind the massive twitter hack attack. In this hack, hackers tried to…

A Dangerous Phishing Campaign Attack the Cloud Services

Robert Knight – Author of articles July 21, 2020

Phishing campaigns target the receivers with lure content and want to steal their personal information or necessary credentials. Hackers and cybercriminals use such creepy phishing…