Auteur/autrice : Dan Parker

With torrents and similar file-sharing platforms becoming increasingly popular as an easy way for people to share large files, it’s more important than ever to be aware of the dangers that come with downloading copyrighted material. Especially since many countries and Internet Service Providers (ISPs) have adopted regulations forbidding those activities. Torrenting carries some risk, so if you don’t take the proper precautions you may end up with a hefty fine or in serious trouble with your ISP. But by taking the necessary steps, you can ensure that your privacy is protected while also avoiding any potentially risky situations. The…

Read More

A recent report from the #1 Trusted Cybersecurity News Platform, followed by 3.45 million readers, has revealed a new malicious malware campaign involving EyeSpy Surveillanceware. The malware, primarily detected in Iran, with smaller detections in Germany and the United States, has the ability to compromise online privacy by logging keystrokes and stealing sensitive data. The Details of EyeSpy Surveillanceware “Parental Control System” with a Dark Side EyeSpy Surveillanceware is being sold as a “parental control system or an online watchdog.” But Romanian cybersecurity firm BitDefender has uncovered that this powerful software can take screenshots, record microphones, log keystrokes, gather files,…

Read More

Threat actors are targeting high-profile organizations after the critical Fortinet VPN vulnerability, CVE-2022-42475, was publicly disclosed in December. The vulnerability, which scored a 9.8 on the Common Vulnerability Scoring System (CVSS), poses a serious risk to users of the FortiOS SSL VPN service. Internal Indicators of Compromise and Evidence of Prominent Victims Fortinet’s extended research into exploitation revealed several internal indicators of compromise (IoC) and evidence of potential prominent victims. Furthermore, the analysis pointed to well-resourced Chinese groups who showed strong comprehension of the operating system, used custom implants, and had multiple time stamps from Eastern Asian countries. Chinese Cyber…

Read More

If you’re a user of torrent technology, you may have heard people talking about seedboxes and VPNs. These two technologies can provide enhanced security and privacy when downloading files. However, the decision between them can be confusing. It’s important to understand their differences, plus the pros and cons for each option. In this article, we will explore the differences between a Seedbox and a VPN; as well as what considerations to make when choosing one over the other. We will discuss topics such as security & privacy risks, speed/reliability/cost comparison, ease of use & availability of support; legal implications; benefits…

Read More

For several years now, the World Data Protection Day has been celebrated. Initiated by the Council of Europe, the day is now celebrated all over the world. It is the occasion to remind some information and especially good practices to protect personal data and to come back on what has been in the center of attention these last months. It’s also the right time to share some surprising figures on our practices regarding the management of our data. Several companies such as Qwant, Proton, Olvid and Murena, are committed to the protection of privacy on the Internet and have published…

Read More

We live in a digital age, where our smartphones are constantly linked to the internet. We rely on it for all forms of communication, from emails to messaging apps, social media and even banking. We’re permanently hooked up — but that leaves us vulnerable if we don’t take proper steps to protect ourselves. It feels like there’s always another security scare or breach hitting the news headlines and unfortunately, nefarious hackers are getting increasingly more sophisticated at accessing data through public wi-fi networks. That makes protecting your personal information all the more important when you communicate online — especially when…

Read More

More and more internet users are turning to VPNs to protect the privacy of their Internet connection. You could be one of them, but why exactly? Here are 5 reasons to adopt a VPN on your devices! On the web, in online videos, you’re bound to have heard of VPN, even if you don’t know exactly what those three letters refer to. Here is their meaning and it is simple: Virtual Private Network! A VPN is a virtual private network that creates an encrypted and secure connection between your computer and the sites you want to reach. You may already…

Read More

DuckDuckGo’s Android application now includes a beta version of a protection system to block tracking by applications installed on your mobile. DuckDuckGo has taken another step in protecting your personal data. The application, which acts as a web browser and search engine, and whose leitmotif is to protect your online privacy has just introduced a new security feature in its latest update on Android. Third-party application trackers can now be blocked Unveiled last year in private beta, this feature, soberly named “Protection against app tracking” is officially available in open beta in the application. It allows, as its name suggests,…

Read More

Using a VPN on PC is recommended, but what about the Mac? The situation is similar and most major VPNs offer applications for Mac, a platform that is equally important to secure. The Mac is often seen as a platform that is safe from threats such as malware and data theft. However, this is not the case: although the Mac is relatively well secured today, just like Windows, it is not invulnerable and you may well need a VPN to secure your Internet connection. And the same is obviously true for other uses of a VPN like anonymity or bypassing…

Read More