Author: Dan Parker

Dan Parker

Dan is a technology reporter from San Jose, California, currently living right in the heart of Silicon Valley. Raised around tech, he's found interests in various gadgets and the companies that make them for years. When not blogging about tech, he can be found hunting for music, shredding the slopes in South Lake, or whipping up a dish for friends in the kitchen.

Did you know that it is possible to install a VPN on your router? If you’re here, you most certainly did. And you’re not the only one who thought of it. It’s a clever idea that extends VPN protection to all devices connected to your Wi-Fi network. If you have multiple computers and devices connected to your network, and want them all to be routed through a VPN connection, you can configure the VPN connection directly on your a VPN compatible router. By doing so, you don’t need to configure each device separately, as your router will automatically connect all…

Read More

There is no other on-demand video streaming service on the market today that can dethrone Netflix anytime soon. The most prominent online streaming platform merely has gained worldwide acceptance, and therefore the viewing public prefers its offers than any other alternative out there. Aside from its vast array of top-rated films, Netflix also offers outstanding originals that have taken the world by storm. Netflix has spent millions of dollars just to create a platform that can provide better entertainment options for the modern-day viewers. Netflix offers a mix of shows that suits subscribers regardless of their age, ethnicity, or gender.…

Read More

The computer espionage attacks that hit many governments and industries also target organizations working to protect civil liberties and human rights around the world, according to a new report from the University of Toronto’s Citizen Lab. However, unlike government and industrial organizations, civil society groups do not have enough resources to handle this problem alone. Although the attacks on these organizations rarely make headlines, they pose a serious threat to the worldwide promotion of democracy and human rights. The study, titled “Communities @ Risk: Targeted Digital Threats Against Civil Society,” is based on four years of research with ten civil…

Read More

A week ago, some visitors to high-profile websites were redirected to browser exploits that installed malware on their PCs, courtesy of the malware advertisements on those websites. The malicious advertisements were discovered between August 19 and August 22, and users didn’t have to click these advertisements to be infected. Researchers from Dutch security firm Fox-IT reported the attack affected visitors to Deviantart.com, Java.com, IBTimes.com, eBay.ie, TVgids.nl, Photobucket.com and Kapaza.be. The websites were not hacked; rather, the malicious ads were distributed through the online ad network AppNexus. (AppNexus removed the ads quickly, which had abused the automated-bidding placement process.) “These websites have not…

Read More

According to a new report released by the infosec experts at Check Point Thursday morning, a new bug found in the guts of broadband routers around the globe could leave up to 12 million desktops, laptops, smartphones and tablets vulnerable to exploitation over the next six months. The problem is the result of an error in HTTP cookie management that pops up whenever a user visits a webpage from their preferred device. This means that basically any device which uses the Internet through your home router is at risk, and marks one of the largest vulnerabilities discovered in the personal networking space…

Read More

The popular Virtual Private Network (VPN) service, HideMyAss have updated their desktop and mobile apps to version three. The new version introduces a new interphase with several new features making it easier to select and connect to a VPN connection. The app is designed to make it easy to comprehend for users with little or no technical knowledge. The software will help the non-savvy users further understand privacy issues whilst those more experienced users will also be impressed with the higher efficiencies compared with rivals. Instead of using technical terms, HMA! Pro VPN v3 offer a choice between three security settings: INSTANT…

Read More

We’re running out of places to hide. The anonymous browsing protocol Tor is to undergo a remodel after news of leaks in the ceiling were discovered early last month. Both the FBI and the NSA have used their own methods to undermine the security of the anonymity relay service, each deploying tactics relative to their understanding of how the network was run over the past several years. The FBI exploited javascript files in the Firefox program used to connect to Tor, whereas the NSA took the backdoor route, attempting to track and tag the activity of users who connect to the…

Read More

While the streets of Hong Kong witness mass protests, the Chinese cyberspace is exploding with complaints about yet another case of censorship. Instagram has been banned in mainland China, but it is still available in Hong Kong where pro-democracy students are revolting against Beijing. Videos and photos of the pro-democracy movement in Hong Kong have been flooding Instagram for over a week and it looks like the authorities do not want people in mainland China to access them. Instagram is yet to confirm the block, but it said that it would look into the situation. However, web monitoring services like…

Read More

This week, details have emerged about a new strain of malware which is capable of hijacking major ad publication platforms on iOS devices, injecting itself into pop-ups in order to gain root access to a user’s phone. According to the latest release of the Virus Bulletin newsletter, the infection, known as “AdThief”, has affected around 22 million ad displays on 75,000 separate jailbroken devices running nearly every cracked version of iOS on the iPhone 4 and 4s, and above. Initially discovered by independent mobile security researcher Claud Xiao of China back in March, the problem has only grown in spread and…

Read More