This week, a new Harvard study released to the public concluded that banning encryption in the United States could lead to catastrophic economic consequences on home soil. The purpose of the study, entitled “A Worldwide Survey of Encryption Products,” was to attempt to catalog the entire library of encryption products that are available in the Read More
Author: Chris Stobing
A lot of people love the idea of using a VPN to protect their privacy online, but actually sticking to it is a whole other job entirely. Although they’re great for keeping your identity under wraps while browsing notoriously data-hungry sits like Google and Facebook, most VPNs are also a burden on internet connections. They Read More
When gaming online, you need all the speed your ISP has to spare. Whether it’s lining up the perfect headshot or going in for a kill with your fireball, a laggy connection can often mean the difference between total victory and crushing defeat. But is it still possible to get a great gaming connection while Read More
Often, one of the most asked about features when setting up a Virtual Private Network (VPN) is “what can I stream with it?”. As Netflix claims it will begin the process of cracking down on VPNs for streaming purposes, we at VPN Creative thought this was a better time than ever to publish the quintessential Read More
In the world of virtual private networks, things can get a bit confusing. With terminology flying around like “proxy”, “SSH”, and “tunneling”, how do you know what you need to get started with your very first VPN connection? Well, fear not fellow privacy warrior, because here at VPN Creative we’re going to give you everything Read More
Symantec has discovered a new line of Android malware infections that turn the operating system’s own services against itself. “Android.Spywaller” poses as a legitimate Google Service designed to protect users via firewall to attack a user’s phone, rooting it from the inside out and installing a number of standard tracking packages including keyloggers and screen-grabbers.
At the recent Democratic debates, front-runner Hillary Clinton was quoted as saying that in order to combat the growing threat of ISIS, the government would need to work with technology partners to begin dismantling “encrypted communication that no law enforcement agency can break into”.
Hearing that an Android device is vulnerable to attack is certainly nothing new by this point. Year over year since its release we’ve been bombarded with news and stories about how Android is leaving mobile phones vulnerable to one deviant exploit or another, but now a new discovery from Palo Alto Networks may officially trump Read More
This week, a representative for the healthcare insurance provider Premera revealed that the core servers of their customer database had been breached, unearthing the details of millions of medical records and putting the majority of their userbase at risk for possible identity theft or worse.
Over a billion people were affected by data breaches in 2014, an all-time high, according to a blog post from IBM’s X-Force threat detection network. “If the year 2014 felt to you like a never-ending roller coaster ride of thrills and excitement within the world of internet security, you wouldn’t be the only one,” wrote Read More