Online fraud is hitting the retail sector

3:22:00 PM Add Comment
Online fraud is hitting the retail sector -

A new retail fraud survey found that online fraud now represents 4% of all types retail fraud, marking a significant increase in online crime data and highlighting lax attitude towards online security retailers that costs about £ 136million in lost revenue each year.

These losses are directly attributable to the stolen information to vulnerable Internet users, which presents itself as no surprise following the recent revelation that online data fraud has increased by 300% since 2010, with a high proportion of Internet users using the same password for multiple accounts without protecting their network connection. According to figures released by Experian, a combination of weak passwords, a growing number of online accounts and online security poor was responsible for the rise, leaving a considerable number of online retailers vulnerable to fraud.

Customers leave their data open to attack by frequently accessing the Internet by the increasing number of Wi-Fi hotspots, a phenomenon that is expected to increase in the coming years, mobile broadband companies vie for increase access to the Internet to those on the movement account. While this technology is a great way to give commuters access to their emails and documents on the move, leaving unsecured access their data vulnerable to hackers who can steal passwords and other information with relative ease .

All consumers who are happy to connect to hotspots for the purpose of shopping online are encouraged to take measures to prevent them from becoming victims of online fraud, with one of the methods the most practical and effective is to subscribe to a VPN service reputable. Using a VPN service when you connect to the Internet is one of the best ways to ensure your data remains safe, offering an encrypted online connection, without the risk of fraud.

A reliable VPN service and cheap can help bring online fraud down its record high levels, thereby reducing the amount of fraud in online retail, which became widespread in digital era. As a consumer, a VPN will also give you peace of mind that your personal data are much less vulnerable to criminal activity surfing the net.

Democracies immune to online censorship

2:21:00 PM Add Comment
Democracies immune to online censorship -

South Korea has started to impose internet censorship on its population online censorship is most often associated with countries like China and Iran, where the one-party rule has meant that restrictions on the freedom of the internet is commonplace, preventing freedom of expression and restrict access to sites that may not be consistent with the government's ideology. However, recent developments in South Korea have shown that no society is immune to censorship, with authorities taking on alarming measures to restrict online communication between citizens.

Reports have emerged of several Twitter users find their accounts blocked, and a number of criminal prosecutions and disciplinary measures taken against those who made negative comments about the South Korean president, in a country that was once celebrated as a beacon of democracy in Asia.

Analysts said the latest wave of online censorship is a direct attack on the "hard-won freedoms" of the South Korean people, government officials are concerned that social networks like Twitter and Facebook potential rallying points for critics and activists who fear a return to dictatorship in the early 1980s increasing numbers of curbs on freedoms online even began to attract international attention, with a recent "Reporters without borders "report adding South Korea to a list of" Internet Enemies ", as well as Egypt, Russia and North Korea.

While the Korean government tried to defend his actions by describing its censorship policy as a logical response to real social problems, it became clear that ordinary citizens are increasingly need network virtual private (VPN), allowing them to surf the Internet anonymously and protect their identities while connecting with like-minded individuals.

anonymous browsing capabilities that are offered by a reliable VPN services are more valuable in countries with forms of online censorship, and giving political activists the ability to communicate their ideas on networks social without fear of persecution by the authorities of espionage. A VPN service is a great way to provide users with access to censored sites, which makes the Internet an open and transparent format that was originally designed to be.

British government to establish cyber security 'university'

1:20:00 PM Add Comment
British government to establish cyber security 'university' -

Following the announcement earlier in the week that electronic intelligence service of the British government, GCHQ, was the creation of a program designed to help leading organizations to improve their cyber security, the British government published the information it is to establish a cyber security 'university'.

As part of their efforts to promote a better understanding of the need for online security, the government launched the first academic research institute in the UK for cyber security, an institution brings together the cyber security personalities, social science, mathematics and computing sectors. The main objective of the institute is to increase knowledge of online security in the public and private sectors by providing solid research and technical know-how, with the hope of allowing public bodies, businesses and individuals to make informed decisions regarding the protection of their online data

Institute was made possible by an investment grant £ 3.8 million to protect a growing part of the national economy. Minister of the United Kingdom for the Cabinet Office, the department responsible for online security, noted that the Internet business now represents about 8% of national GDP and "this trend is set to grow."

the creation of an institute designed only looking for online security is the latest effort by GCHQ to improve awareness and online protection in a program that has seen several universities received funding and additional companies receive direct advice of the agency. it is hoped that these combined efforts will lead to a safer digital economy in the future and reduce the risk of data theft large UK companies.

While the creation of the institute is to be applauded, the fact that it is necessary recognize that companies and government agencies are struggling to stay in the race for online security arms. However, there are simple steps everyone can take to help keep their secure online connections, such as a VPN service. Using a VPN service is a great way for businesses and individuals for their connection to a website is securely encrypted, protecting their identity and confidential information whether at work, at home or in travel online.

Splinternet and cyberbalkanisation - two key terms

12:19:00 PM Add Comment
Splinternet and cyberbalkanisation - two key terms -

In discussions about the ongoing threat of widespread Internet censorship in - but not exclusively - countries with Iran, China, Saudi Arabia, Pakistan and South Korea, there are a couple of different terms that are often used, but could do with some explanation. They are cyberbalkanisation "and" splinternet . "

Although the two words relate primarily to the same, they differ slightly in their application. The first cyberbalkanisation, describes the process by which the censorship and the application of filters on Internet content causes fragmentation or subdivisions within, while the second, splinternet, is a pun coined to describe the Internet as it exists in each separate nation providing its own separate version for users of its country.

Cyberbalkanisation not only about censorship, however, but also the most innocuous questions apparent targeted advertising, where algorithms can track your online activity and target you with banner ads and messages of products based on this you searched or purchased.

sake of people have with cyberbalkanisation however, whether about censorship or advertisement designed for the user is that it can lead to a narrow view of the world, interrupt people alternatives that might question their beliefs or current tastes.

In his 01 book, Republic.com , Cass Sunstein put forward this argument by saying that splinternet could actually weaken democracy because it allows people to isolate themselves in groups that they feel they can identify, cutting any information that might challenge them out of the loop.

that this is true is perhaps something we will not know until it starts to happen, but it is clear that filtering or outright censorship of the contents of Internet already creates big differences in what information can be accessed by which through different nations.

one way to get around some of these restrictions, already being used by people around the world, is the use of a virtual private network, or VPN, to access the Internet. By encrypting all information in and out online, a virtual private network will help prevent regulatory agencies or the Internet service providers from the application blocks that you access because they are less likely to be able to see anything - from Web history to emails -. through the VPN connection

Smartphones: the main cause of the privacy

10:17:00 PM Add Comment
Smartphones: the main cause of the privacy -

A new study found that a whopping 80% of all citizens aware of the technology in the UK are worried their use of a smartphone or tablet puts their personal data at risk, with many cited as a reason not to use their personal devices at work.

According to research conducted by the organization of nonprofit technology ISACA, the figures are also replicable worldwide; the study found similar results in a much larger study of users of more than 80 countries worldwide. Only 12% of people in the UK, however, have no problem at all, while the vast majority agree that the online information sharing using a mobile device is a major security risk.

Despite these concerns, the study also found that many consumers are still unaware of the behaviors that are considered hazardous. A worrying 16% continue to use the same passwords for their accounts work as they do for their accounts online shopping. 23% also now use their work email to register for third-party sites, while 20% are happy to click on unknown links posted on websites for social networking. It has become an unfortunate fact that social networking links become one of the largest sources of malware in the world.

Although there seems to be a form of willingness to surrender personal information using these devices, the main source of concern comes from those who worry that the lack of security could leave their stored information at risk for hackers. This concern seems to be justified, after the study also found that an overwhelming 80% of consumers prefer not to check their security settings on online shopping sites. In addition, 22% believe that in the workplace, their IT departments will be responsible for online security of their personal device.

Consumers who wish to take additional measures to protect their personal information may give thought to choose a VPN provider, giving them a first line of defense against the alleged pirates. Modern VPN provider will allow users to install the VPN software on their smartphone, giving them a greater level of protection while surfing the net on an unsecured network.

Official UK government distributes net safety tips "scandalous"

11:18:00 AM Add Comment
Official UK government distributes net safety tips "scandalous" -

cautious users looking to keep safe and secure their personal data would be wise to ignore the advice a senior UK government official, who told viewers that the only way to protect their information was to give false information to non-governmental websites.

observations were made by Andy Smith, a leading Internet security advisers of the coalition government, which urged users not to "use your real name [or] your real date of birth "when registering for social networks, email accounts or other online services. This despite the fact that this can constitute a violation of the terms and conditions of many websites, and lead to a suspension of membership for sites such as Facebook and Twitter. reactions to the suggestion were mostly incredulous, with Helen Goodman Labour MP saying he was "totally outrageous" to encourage such behavior.

critics of Mr. Smith was quick to point out that the anonymity of the Internet is a major cause of bullying online, with users able to hide their identity for malicious purposes; Government approval of such practices would, they say, only encourage this behavior. Coalition officials have moved quickly to stand out comments, with Culture Minister Ed Vaizey stating that he "would not encourage people to put false identities on the Internet."

Mr. Smith's advice suggests that only managed by the government websites could trust the citizens' personal data has also raised eyebrows, with commentators raising the question of government backed Data Communications Bill, otherwise known as "Charter Snooper." the bill would give the government broad powers to monitor, record and save the daily interactions of Web users, in what some fear would be a terrible blow to privacy on the Internet.

If you take the sensible approach without considering the comments of Andy Smith, but are still concerned about online privacy and security of data, opting to create an account with a reliable VPN provider is a method much more effective to keep your data secure VPN provider -. a proxy form - encrypts all outgoing web traffic, making it difficult for the average snooper to steal your personal information, real or otherwise. Using a VPN provider gives you a first line of defense against so-nosy, helping to keep your data safe.

IBM India label as the largest spam

9:16:00 PM Add Comment
IBM India label as the largest spam - nation

A new report giants IBM technology revealed that India has overtaken America to become the largest contributor to global spam levels, contributing a whopping 16% of the world total.

Email spam has been a persistent security problem online since the widespread adoption of the net, with the phenomenal rise of India in the junk mail production more in line with its number of Web users assets. India experienced an impressive 25% increase in the number of those connected to the Internet, which is a huge amount of growth potential market for advertisers and cyber criminals.

The report also addressed a number of online security issues, including the growing threat to mobile users downloading applications unscrupulous or connecting to unsecured WiFi networks. This threat has become a major concern for businesses, with the increasing tendency of companies to allow their employees to bring their own devices to work. Potentially sensitive information can be endangered when tablets and smartphones are used for personal reasons. In response, IBM suggests that business owners implement a complete security system before considering the use of personal devices at work, although this advice has been largely ignored to date.

Online security is becoming a hot topic for 2013, with growth in the number of smartphone owners and tablet users deciding to ignore basic security measures, combined with the procedures often lax screening mobile stores such as Google Play. The projection of mobile applications has been the subject of particular attention in recent weeks, with Android owners being at risk of malware infection from malicious applications that take control of a device individual.

In response to the growing number of online security threats facing the world in 2013, security companies have been designing ever more sophisticated methods of maintaining office and secure mobile devices. A VPN service is one of the most simple and easy to use security methods, providing an extra layer of privacy to your internet connection. This is particularly useful when connecting to an unsecured Wi-Fi network. A VPN service is easy to install and very affordable, making it a viable option for anyone concerned about their online security.

McAfee refers to a new approach to online security

8:14:00 PM Add Comment
McAfee refers to a new approach to online security -

toy-soldiers-tablet Online security is quickly becoming the subject of the 2013 CES highly anticipated event, and both McAfee and Intel have confirmed their commitment to making the Internet a safer place over the next 12 months.

McAfee has announced the development of a new approach to user-centric online security to a product which should be released in about six months. The new product is set to have a mobile home with McAfee to capitalize on the disturbing trend of mobile device infection and the desire of mobile users to protect their identity unwelcome attention.

According to a McAfee senior employee, the new online security product is being developed in response to needs "evolution" of consumers, who are increasingly using mobile devices in all fields of life. Hinting at the global nature of the upcoming product, the employee noted that "there is no longer good enough to protect any device from a particular piece of malware. Instead, we must protect what a consumer is online, no matter the device or where it is used. "

Analysts already provide the kind of features that this new product will contain, while the company confirmed that it will take a "multi-device approach," with a strong emphasis on the protection of the identity and security of personal data. a new anti-virus software approach will be considered a welcome initiative in the online security industry, with consumers constantly affected by increasingly complex virus strains through their range of devices. mobile solution will be especially welcome after several safety reports damn for the platform Android mobile popular.

a sophisticated anti-virus solution is the ideal partner for a virtual private network, with both able to work in tandem to give you the highest level of protection against data thieves. the use of a Virtual Private Network can help secure your identity by encrypting your data, keeping your information secure when using unsecure or unknown networks. The combination of a high rate virtual private network software such as McAfee is a great way to improve your online security.

Weekly Tip: How to use OpenVPN on an iPad or iPhone

7:13:00 PM Add Comment
Weekly Tip: How to use OpenVPN on an iPad or iPhone -

Weekly Tip: How to use OpenVPN on an iPad or iPhone

until recently it was not possible to use the OpenVPN protocol on an iPad or iPhone (unless you "jailbreak" your device), such as VPN settings in iOS devices do not include OpenVPN option.

Fortunately, the good people over at OpenVPN, Inc. released an app in the App Store that allows the creation of an OpenVPN connection, and you can use this in conjunction with your HMA Pro VPN Account .

of all you need to download the OpenVPN application from the App Store on your Apple device First.

Then you must import the profile HMA Pro VPN server you want to connect. This can be done in a number of ways.

  • Use Dropbox
  • If you have the Dropbox app installed, you can create a link to this public dropbox, and add it to your Dropbox folder list.
    then select from TCP or UDP protocols and open the folder. Then select from the list of servers and open the file. Click the icon in the top corner to the right, giving you the option "Open in OpenVPN" - and select this option.

  • Use your computer and email

On your PC or Mac go to http://hidemyass.com/vpn -config /vpn-config.zip and download and extract the files to your computer.

you can then send the configuration file you want to use for yourself and open the email on your iPad or iPhone. Once you have the attachment, you can click on the "Open in" and select OpenVPN.

Whichever route you use, now you started the OpenVPN application. Then click on the "+" button to add the profile, then add your username usual HMA Pro VPN and password.

Finally, you simply move the connection switch on the application "on" and you're done!

You can repeat these steps and install various VPN servers, if you have a range to choose from.

We will soon publish our own native iOS application for iPad and iPhone, but now it's probably the best way to implement.

for more details and screenshots, please see our wiki: http://wiki.hidemyass.com/OpenVPN_setup_on_iPad_iPhone_iTouch

News Roundup: Congress threatening online private life (again), the cost of cybercrime revealed, and security still weak password

6:12:00 PM Add Comment
News Roundup: Congress threatening online private life (again), the cost of cybercrime revealed, and security still weak password -

Congress v online Privacy

US lawmakers have outraged the online community this week, after another attempt to pass the "law Cyber ​​Intelligence sharing and protection" many derided (CISPA) Law practically destroy the concept of online privacy in the US, with companies and government agencies allowed to share their citizens and employees' personal information -. it appears Congress has managed to provide a law to protect privacy, while also destroying privacy

Needless to say, the American civil Liberties Union (ACLU) has launched an anti-CISPA campaign, with the legal advice of the group noting that "suddenly, the privacy laws are no longer valid."

UK reveals the cost of cybercrime

The UK economy is apparently losing up to £ 27 billion a year through cybercrime, with private sector organizations experience around 44 million attacks in 2011 alone. The figures were from the National Audit Office, which perhaps dubiously also managed to declare that the cyber security efforts in the UK were "already bearing fruit." Cyber ​​security has become a major challenge for the UK economy, with the Internet now contributing an impressive 8% to national GDP.

Despite this, politicians have missed their usual zeal forcing the issue with their impressive named "Cyber ​​Security Strategy" not defined for implementation until 2015.

password1 still strong

to the dismay of teachers IT and security experts as well, new research by global security company Trustwave found that the security of password passes to the general public is still very low, with "password1" still a popular choice. The problem, experts say, is a lack of education on the importance of staff security password. However, a misanthrope expert was quick to say that "if someone is said to have a password a hundred times, they still will not do it."

The word perfect pass was something that has eluded the majority of Internet users for many years, and it is worth changing your password regularly to try to keep the remote hackers. the people avant-garde Google is already working on a solution to the password problem, with the company looking at a "physical token" as a replacement.

Other issues expected to Java Oracle

5:11:00 PM Add Comment
Other issues expected to Java Oracle -

There was something a poor start to the year for Oracle and it does not seem likely that it going to be getting better any time soon. FireEye security cabinet has discovered yet another zero-day exploit affecting Java Oracle software in a long list of flaws that have been discovered.

FireEye Researchers say that the vulnerability has already been used to attack several customers "and can be operated in browsers that have Java v1.6 Update 41 or Java v1.7 Update 15 installed - last supposedly patched versions of the plugin. FireEye warns that this new flaw is used to install a Trojan remote access McRat called and said it is another feat to that which caused major security holes on Facebook, Twitter and Apple recently. McRat is a Trojan Windows and therefore, although it is unclear so far if the defect affects only Windows or computers that run on Linux and Mac OS X are also susceptible, attacks "in the wild" are specifically focus on Windows users.

last updated Java was applied February 19 and despite being an outlet provided that only 5 targeted security holes, he followed an emergency update that patched 50 vulnerabilities. The bad news for everyone who has applied these updates hoping that their worries disappear is that security researchers from Kaspersky Lab last week claimed that the exploit worked in the latest update of Java ( update 15), but seem to fail in older - such as update 10. the only positive news is that FireEye can offer is that the exploit does not seem to be very reliable as it tries to crush large chunks of memory and eventually causes a virtual accident JVM often.

If you are reading this now on a Java-enabled browser, the current advice is to uninstall or disable Java or set your security settings to "High" when you need to use it. If you are concerned about online security more generally, then invest in a VPN service will give you an extra level of protection. If your VPN is enabled while you browse the Internet, your system is less likely to be exploited by hackers.

Yahoo CEO bans working from home on the VPN database

4:10:00 PM Add Comment
Yahoo CEO bans working from home on the VPN database -

Earlier this year, Yahoo! CEO Marissa Mayer made a splash by prohibiting employees work from home, accusing them home workers of the company not to pay enough attention to the "work" part of their job description. Now, less than two months later, it emerged that the magnet Data CEO rather mistakenly based its decision on the amount of staff time spent connected to their work system, blindly taking this as a measure of productivity. A number of industry insiders, it based its measure employee work rate on the amount of time they were connected to the VPN Yahoo !, rather than the content they were actually occur.

Mayer is said to have examined the VPN usage statistics of the company over a period of months, and found that the connection times were significantly lower when employees use their personal computers at home, with respect to employees who have preferred to use the -Supplied society wired into computers at AC Yahoo !. While Hide My Ass! certainly applauds Ms. Mayer faith in its VPN service, we see a VPN as an easy step towards better online protection, rather than a way to measure the quality of production of an employee. In any case, a VPN would certainly not prevent employees from taking long breaks away from the computer while connected; productivity should be measured only on the quantity and quality of work.

The Ms. Mayer justification for the prohibition of labor flexibility has also been the subject of a recent study by Microsoft Enterprise, which found that a staggering 70% of employees believed that they were more productive outside the office, with another 38% stating that working from home allows them to show their creative side, improving the overall quality of work they produce. If these results are correct, it can be a matter of time before grunting employees turn into full scale rebellion.

A VPN is a great addition to digital workflow of any business by helping employees and employers to protect their sensitive information in a home working environment. While it can not provide an accurate picture of employee productivity, VPN service will add an extra layer of security to your Internet connection, keeping your data safe little more potential snoops.

News Roundup: North Korea behind major attack hacking, do not follow the law in line to make progress in the United States, and hackers could target

3:09:00 PM Add Comment
News Roundup: North Korea behind major attack hacking, do not follow the law in line to make progress in the United States, and hackers could target - autopilot systems

North Korea revealed that the pirates of southern computers

While North Korea may be incompetent regarding the nuclear weapons, they are definitely trying to make up for it with their hacking folder sanctioned by the state. The rogue state was recently revealed to be behind a major hacking attack on the media industry in South Korea, which saw more than 30,000 hard drives wiped in late March. The attack also affected the major banks, with useless online services for a number of hours.

The attack demonstrates the growing confidence of the North, and has further fueled the always vicious war of words between the two states. It is also a worrying sign for the South, which will now be working hard to consolidate their online defenses to prevent further attacks on national infrastructure.

US lawmakers consider the proposed Privacy Act Office

US lawmakers have gone a step further to ensure a private minimum living online this week, after influential Senator Jay Rockefeller has introduced a new bill to prevent companies sneakily monitoring user behavior. The online law unimaginatively named Unfollow prevent the data recording companies without their permission, effectively trump the privacy policies of websites and protect American consumers from users private information.

A similar bill is under consideration in California, highlighting the growing importance of online privacy for computer users across the United States. A number of farms technology groups are already preparing to launch a fervent resistance bills, with organizations including the Alliance admitting TechAmerica Internet and concerns about how the law would affect their interests commercial.

analyst reveals autopilot hack

A leading security analyst was able to hack his way into the navigation systems of a simulated commercial airplane , opening the way to sophisticated hackers to potentially take control of the aircraft autopilot systems. The analyst is now wanted by national security agencies in Europe and the US, who are interested to know if the same method could be used to compromise an operational aircraft.

industry experts have been quick to try to calm public fears, saying that any hacker would also have a "solid knowledge of aviation" in order to be successful.

News Roundup: British government to block 'web browsing' bill, AP Twitter hack causes Dow plunge and another Java flaw being exploited widely

2:08:00 PM Add Comment
News Roundup: British government to block 'web browsing' bill, AP Twitter hack causes Dow plunge and another Java flaw being exploited widely -

British government will block 'web snooping' bill

Data Communications Bill British Home office, which proposed store details of every citizen online activity will be blocked as long the Deputy Prime Minister Nick Clegg remains in charge, he said this week. The bill proposes that the browsing history of every Briton, emails, interactions with social media and phone calls should be recorded and stored for a year, along with other details such as location the device connected to the Internet, the call duration and the names of sender and recipient. The British minister wants the bill to be in place by next year, but a number of members have already objected to some of its provisions, which means that the initial proposals are now reformulated.

Associated Press Twitter hack causes Dow plunge

US stock market experienced a sharp drop Tuesday afternoon, after the official report from the Associated Press Twitter reported that President Obama had been injured in a bomb attack against the white House. The Dow Jones Industrial Average experienced a triple digit advance Tuesday morning, but it was completely cleared when panicked and automatic trading algorithms sold all their stocks traders. The Associated Press has suspended all of its Twitter accounts when he realized what had happened and launched an account on Security.

Yet another Java flaw being widely exploited

Java Oracle has been in the news a lot recently, and it's not something that looks like this will change soon. Security researchers have warned that Java Remote Code that was recently patched is now widely exploited by cyber criminals who attempt to infect computers worldwide with scareware. The vulnerability has been one of many to have apparently been fixed in the update last week. Despite being given a rather low score under the CVSS (Common Vulnerability Scoring System), cyber criminals have rushed to take advantage of those who have not already applied the latest update - if you are worried about your computer, the advice is to update Java as soon as possible.

Apple inundated with requests from law enforcement to decrypt

1:07:00 PM Add Comment
Apple inundated with requests from law enforcement to decrypt - devices

One would think that when the police get the personal mobile phone or tablet someone ' one, all their secrets are revealed in a flash. Apparently this is not the case, however, as Apple security software on their iPhones and iPads is now so good that the law enforcement agencies use to ask the company itself to help unlock - so often in fact that Apple set up a waiting list.

Apple security encryption on devices like the iPhone and iPad is so sophisticated that it is a well known fact that the company will gladly help government agencies who have difficulty in breaking in them. What has been revealed this week, however, is how far Apple expands with when it comes to other law enforcement agencies. Recent court documents obtained by CNET include an agent of Bureau of Alcohol, Tobacco, Firearms and Explosives have been informed that, although the company would be happy to break the encryption on an order unit, it would be up to 7 weeks before they had to be able to get around to it. It is unclear how Apple managed to decode the locks, but - once they finally get to it - compromise data is then transmitted to the authorities on a USB drive for them to study more

Manufacturers phones help. phone encryption crack authorities are not a new development, as Google have also been known to help the police. The main difference here, however, is that Google takes the approach of resetting the password for authority, which has the side effect of letting the phone owner know that their security has been breached. Apple simply break and pass data without letting the user know -. Raising questions surrounding the ethics of so-called warrantless searches when applied to electronic data

While you might not be able to stop the authorities and phone manufacturer for enter your phone, thankfully, it is much easier to help protect personal information on your PC with a VPN service. A VPN allows you to put an extra layer of security between your personal data and any unwanted user when browsing the Web, which means that your information is more likely to remain safely where it belongs.

Facebook Twitter copies by enabling users to verification

12:06:00 PM Add Comment
Facebook Twitter copies by enabling users to verification -

Following in the footsteps of Twitter, the giants of social media Facebook announced a new feature "verified" to pages and profiles. These pages are checked first being deployed to a small group of high profile users like celebrities, journalists, government officials, brands and businesses, but will also be available for profiles at a later stage.

The movement will try to fight against fake multiple profiles that appear to actors, singers and other celebrities with accounts at least a hundred of 'Justin Bieber' there on time today, with more than a few pretending be 'checked official'.The Facebook pages show a blue tick check next to the name of the page, indicating that the person or company is genuine. When you hover over the icon of the tick, you are told more about the audit. This will bring not only on the page itself, but also in the search results, and through Facebook.

Have adding verified accounts is a great way to show both the authority and authenticity on Facebook - there are so many fake accounts online, knowing that you have found the true is always positive. As on Twitter, you can not ask to be verified by Facebook. If Facebook think that checking your page is required, then they will contact you.

This is not the first attempt by Facebook to suppress fake profiles. Back in February 2012, they introduced a motion that allowed people to check their accounts with a valid ID. This allowed users, mostly celebrities, to have nicknames or pseudonyms instead of their real name posted on their page without losing their ranking in the Facebook search results. This first attempt to audit the fans well in connection with authentic accounts of celebrities, but unlike the new version included no public sign.

Whether you are a celebrity want to keep your account yourself, or fan trying to avoid falling for a fake title, the Internet is a concern for us all. Having the new verification process in place on Facebook should everyone know that the account is legitimate and trustworthy. If you are aware of protecting the online identity, a way to safety is to use a VPN service. A VPN provides an additional layer of security to your connection when using online services to help keep your personal data secure and private.

VPN server in South Korea added to our network

10:04:00 PM 1 Comment
VPN server in South Korea added to our network -

We added 7 servers, IP addresses 1119 and 1 NEW countries HMA! Pro VPN network including a VPN server in South Korea

We also added multiple VPN servers in Madrid and the UK

Here are the details:.!

  1. Spain, Madrid (VPN LOC1 S3) (252 IPs)
  2. South Korea, Seoul VPN (252 IPs)
  3. UK , Berkshire, Maidenhead VPN (LOC1 S18) (123 IPs)
  4. United Kingdom, Berkshire, Maidenhead VPN (LOC1 S17) (123 IPs)
  5. United Kingdom, Berkshire, Maidenhead (VPN LOC1 S16) (123 IPs)
  6. United Kingdom, Berkshire, Maidenhead VPN (LOC1 S15) (123 IPs)
  7. United Kingdom, Berkshire, Maidenhead VPN (LOC1 S14) (123 IPs )

You may have noticed that we have a new country in our database. Please welcome South Korea to our VPN server network!

random Done South Korea

"Fan Death" is a widespread belief in South Korea that an electric fan left running during night in a closed room can cause the death of those who sleep inside. Read more on wikipedia

Four of the five largest British banks say cyber attacks are a greater risk that the crisis in the eurozone

11:05:00 AM Add Comment
Four of the five largest British banks say cyber attacks are a greater risk that the crisis in the eurozone -

Andrew Haldane, the Bank of England manager financial stability, reported that cyber attacks now rank above the crisis in the euro zone in terms of threats to British banks. He warned, however, that the general understanding of risk and how to manage them was still at an "early stage".

Haldane said that four out of five of the largest banks in the UK said that cyber attacks now posed a greater threat to the stability of the eurozone crisis. Interestingly, the remaining bank was apparently not included hacking fears in their list at all, prompting Haldane observed that banks needed to be more aware of potential vulnerabilities and ensure that their protection was constantly reassessed to deal with the "never -evolving 'online threats. He added that more action is required by the Bank Committee of the financial policy of England and the government to ensure that the financial sector was prepared to deal with attacks when they occurred. The bank unrated cyber threats before as a priority concern now add to his list.

The UK security CTO of Symantec Sian John also stressed that the financial corporations and public sector institutions were the companies and the most attacked organizations in the UK in 2012, and warned that more must be done to protect the banking groups against threats like this one. increased the risk that financial institutions are placed in fact it is more important than ever that consciousness is raised, especially as the security firm Prolexic reported one of the largest ever targeted attacks in a financial exchange office last month. The large amount of personal data stored by banks puts up as an obviously attractive prospect for attackers, making it crucial for the security measures banks to be always ahead of the criminals.

You might not be able to do a lot of the safety of large banks and other financial companies, but you can defenses on your personal computer using a VPN service. A VPN provides an additional level of safety between potential hackers and your private data to help you protect while using the internet.

63 technology companies ask permission to release more data on the safety demands of the authority of the United States

9:03:00 PM Add Comment
63 technology companies ask permission to release more data on the safety demands of the authority of the United States -

After the scathing revelations of Edward Snowden about NSA and extent of the spying capabilities of the US, several large technology companies have asked the US authorities allow them to release more details about security demands.

companies such as Apple, Google, Facebook and Twitter want permission to publish regular statistics on the number and size of data requests they receive. 63 organizations sent a letter outlining the proposal to President Obama, Congress and director of the NSA, General Keith Alexander, Thursday, with action also supported by campaign groups, including Human Rights Watch and the Electronic Frontier Foundation.

Current permissions allow companies to release data security demands, but in many cases they are required to apply to the courts for permission first and limit the scope of information provided . Alexander acknowledged public anger at revelations of Snowden, and argued that the companies are guilty of complying with data requests:

[These companies] do not have a choice. Court order, they must do. What they want is the rest of the world know that we are not all read that email, so they want to give the numbers. "

He continued that the proposals were something that the authorities consider, but stressed it was important to ensure that such things were done correctly, and is not impact on the ongoing investigations of the FBI.

Elsewhere, Anthony Romero, executive director of the American Civil Liberties Union, stressed that Snowden has done [America] service ", opening questions about government access to private data, well that this statement was immediately countered by several other participants in the same national security conference in Colorado. Snowden itself remains in limbo, stuck in Moscow airport where he has been for nearly a month that his revelations continue to make waves in the world.

If you have concerns about your online privacy and a VPN service could be just what you are looking for. A VPN allows your computer with an extra level of security when using the Internet to help ensure your connection is safe and protected.

News Roundup: Motorola announces phone is "always listening" Syrian Electronic Army aims Reuters and White House, and Apple releases the update t ...

8:02:00 PM Add Comment
News Roundup: Motorola announces phone is "always listening" Syrian Electronic Army aims Reuters and White House, and Apple releases the update t ... -

Motorola announced the phone is "always listening

Motorola has announced a new phone that is said to be" still listening "for any voice command its owner. The company, which is owned by Google, has revealed that the Moto X will constantly listening to the phrase, 'Okay Google Now ... "in order to respond to the instructions of its owner. The phone will be in the United States and customers will be able to customize their device in depth. owned by Google brand makes this new version may cause tensions in the Android market, because at present the vast majority of sales come from Samsung Android phones. Several other manufacturers whose phones run on Google's operating system are struggling to generate enough sales.

Syrian Electronic Army Reuters Twitter account target and emails from the White House

Pro-Assad hackers known as the Syrian Electronic Army has targeted Thompson Reuters Twitter and multiple email accounts used by staff of social media for the white House in order to disseminate pro-Assad messages in support of the Syrian government. Mail accounts from the White House were phished by a collection of emails claiming to come from the BBC and CNN. The attack failed, but a Reuters hack Twitter account was successful. The SEA has used the account to share cartoons and political messages until he was suspended and restored.

Apple releases update to deal with malicious loaders

We have previously reported that a group of researchers from the Georgia Institute of Technology had put developed a device that could allow hackers to penetrate an iPhone using the charger from the phone only. Apple has now confirmed that it plans to release a software update to try to protect its products from these malicious loaders. The update is still pending at the moment, but warns users to be sure they trust both the shipper and the point of loading prior to plug their device. Malicious chargers and data theft application they are using have been exhibited at the conference Black Hat Hacker, who is being held in Las Vegas.

Google says that the laws on privacy in the UK do not apply to them as they face a court case

7:01:00 PM Add Comment
Google says that the laws on privacy in the UK do not apply to them as they face a court case - mark

Internet search giant Google uses an unusual defense against claims he illegally monitoring Internet activity, arguing that British laws they are alleged to have broken do not apply to them.

The applicants based in the UK say Google bypassed a privacy setting on their iPhones and Apple Mac computers to illegally monitor their Internet activity and are trying to pay legal case against group of historical society.

privacy settings Apple default means that web sites are blocked to install things like cookies that track companies like Google Internet use and target the ads user to them personally. It is alleged that Google has written software that has been specifically designed to work around these settings without previously notifying users.

Google maintains he did not use cookies to gather personal information, but the Federal Trade Commission has already imposed a record fine of $ 22.5 million on them. The company is now difficult to taken to have the case dismissed by the courts of the United Kingdom to the hearing abroad, claiming that it is not subject to British law because his service Customer, Google Inc., is based in Silicon Valley, California.

demand sparked outrage among many activists as it comes on the heels of news that Google had failed to pay a significant amount of tax in the UK, prompting some to argue that the the company operates in the country if it suits them

Google's attempt to have their case heard elsewhere will be considered in October, but given the fact that the offenses were committed in an address' .co.uk Web -. and that the company is building office worth $ 1 billion in the UK -. he's not looking promising for the search giant

If you are worried about the security of personal information you have on your computer and a VPN service can offer you some extra peace of mind . A VPN allows your computer with an extra level of security when surfing the Internet so that your personal information remains confidential.

Report claims British and American intelligence agencies have cracked a

6:00:00 PM Add Comment
Report claims British and American intelligence agencies have cracked a - online encryption technology

A recent report claimed that the British and American intelligence agencies have managed to break encryption codes that protect emails, bank details and the medical records of hundreds of millions of people.

revelations were made by fugitive whistleblower Edward Snowden, who claims that American national security agency (NSA) and GCHQ UK have managed to successfully decode the protocols used by online sites such as Google, Facebook and Yahoo. Intelligence agencies are supposed to focus on the security of encryption used in 4G smartphones, email accounts and online shopping.

The NSA is supposed to spend about $ 250m (£ 0m) a year on top-secret operation, the American name Bullrun Civil War battle. The numbers from documents published by The Guardian , in collaboration with the New York Times and ProPublica. The agency reportedly built powerful supercomputers to try to break the encryption that is used to confuse personal information when users connect to certain online services. The report goes on to claim that some unnamed technology companies have collaborated with the security agencies in this operation. Some Internet companies may even have provided the NSA with access "back door" into their systems, leaving information for the government before it is encrypted.

NSA officials defend the actions of the organization, saying that the inability to decipher the terrorists and spies messages could put the United States in the immense danger. However, security experts have responded to these demands with the argument that these actions could have exactly the opposite effect. They claim that "backdoors" that the government put in place could also be easily operated by the same enemies that are theoretically trying to defend against.

If you are worried about the security of your personal information, then a VPN service can offer you some peace of mind. A VPN works by giving your computer a further layer of protection when you surf the net, helping to ensure that your private data stays safe.

We have just launched the official HMA! Pro VPN app iOS!

4:59:00 PM Add Comment
We have just launched the official HMA! Pro VPN app iOS! -

We are very pleased to announce the launch of the new Hide My Ass! IOS App Pro VPN.

The dedicated HMA! Pro iOS app VPN VPN provides the best experience for your iPhone or iPad. Giving you quick and easy access to one of the biggest available servers networks -. securing and encrypting the Internet connection on your iPhone or iPad has never been easier

  1. free to download
  2. easily create and install VPN profiles for iOS devices
  3. level encryption government on 460+ servers 60+ countries
  4. ultra-fast connection speeds
  5. multi-protocol support
  6. Unlock all streaming sites

all HMA! Subscribers can now download the free application from the App Store and now log in using their HMA! Username and password.

We HMA!

3:58:00 PM Add Comment
We HMA! -

We want you to feel part of our HMA! family and with that said, I would like to introduce some of our HMA! support team to clients. It is always good to know who you're talking about!

Pavle AKA Paul

Paul was born and raised in Belgrade, Serbia, and has been with the company since January 2013. He works in our billing and fraud department.

Before joining HMA! Paul worked for a national insurance company, an outsourcing company and was also a fixer organizing various concerts and events in Serbia.

He loves food, rock music (he also played in a heavy metal band for several years) sports, ancient history, archeology and astronomy, most of the unsolved mysteries of the world.

Mila

Mila joined HMA ! in June 2013 and works in the billing department or one of his colleagues like to call the team "Engineering of happiness."

She studied a variety of topics in the world's universities whole, including Serbia, Sweden and the United States, studying Swedish, English, literature and modern communication She is also passionate about the environment and has participated in many seminars and projects

Nenad AKA Jeremy

Jeremy joined HMA! in 2012 and works in LiveChat as agent of technical customer support.

Jeremy is a graduate in Japanese and literature. Before joining HMA! it was a Japanese university teacher, kindergarten teacher and an English teacher.

is a big fan of the beard, and he began to grow a high school . It does not intend to shave. - Maybe an occasional trim here and there

Petar

Petar has been with us for over a year and is a team leader and a training team member for our new support staff.

He graduated in mechanical science, but ended in the IT industry because of his love for gadgets and computers. He always liked to break everything apart and put it back together without extra parts left.

Before joining HMA! Petar, worked as IT administrator for several companies, but love working for HMA! as he likes the treatment of technical questions and help customers make the most of our service.

The differences and benefits of VPNs and proxies

2:57:00 PM Add Comment
The differences and benefits of VPNs and proxies -

If you do not know the difference between a VPN and IP :. Proxies Port, do not worry everything will be explained

Port IP: Stands for Internet Protocol Port. There are thousands of ports, and each of them is like a mailbox for different services. For example, the Internet will use port 80; use another email, etc. So you have to "open ports" on your firewall to allow different traffic through or block ports to stop the attackers connecting to your computer.

VPN stands for Virtual Private Network. VPN is a service that encrypts your Internet connection and makes it anonymous and as such all applications on your computer or device is attached.
Both will reroute traffic to your internet that changes your IP address. This will make your eyes on the use of the Internet as if it comes from another place; using a different ISP, leaving no direct link between the IP and used your identity

The main advantages can be found in terms of safety, for example :.
• proxies can be used with applications that specifically support the use of proxies. This will leave all other non-protected applications, so that, for example, your navigation is partially secured after you have configured to use a proxy, while other applications continue using your real IP address and expose your identity

• a VPN system works -WIDE and not on a per-application basis. This means when connected to a VPN, all applications on your system will be automatically protected by it without having to manually configure them

• Proxies only offer a minimum amount of security, and you rarely know who is running the proxy and what they do with your traffic data

• VPN offers maximum security through encryption level of government standards, and you know who is behind

it there are a number of differences, for example:
• Compatibility: When configuring, for example, a Web browser to use a proxy, only the web browsing traffic is encrypted. External applications that are used by the browser, for example plugins like Flash, Java, Silverlight, etc., simply ignore the proxy and to continue to send and receive data with your normal Internet connection and IP

• speed: proxy servers can be run by anyone on slow machines with poor Internet connections, resulting in low speeds. HMA! managed VPN servers on high-end servers in the higher data centers worldwide. This ensures maximum speed, performance and reliability

• Variety: You can consider yourself lucky if you found a fast proxy, safe and reliable for your country or favorite place. But only HMA! Pro VPN offers you 498+ VPN servers in 63 countries with more than 59,500 usable IP addresses. Compare that!

HMA! Android App Beta Now Live!

1:56:00 PM Add Comment
HMA! Android App Beta Now Live! -

Android users can now sign up for our beta in joining our beta group HMA.

You will be able to help test and give feedback on the new features in future versions of HMA! Android. Please see the official instructions on the page before Google community and release notes:

Register here

The position of "Shark Wrangler" is now closed

12:55:00 PM Add Comment
The position of "Shark Wrangler" is now closed -

A massive thank you to all those who have applied for the post of Shark wrangler in our London office - of course, it was our April Fools, though, perhaps every office has a shark should employ ?!

our inbox was flooded with applicants, and Nigel was very eager to work with the right manager. In fact, he was sorting out her wardrobe and blowing some dust off his favorite movies (all on VHS), "Under Siege" with Steven Segal, A Sharks Tale, Shark, Shark Attack and Shark Attack 3 Megalodon and of course, Jaws (Jaws was his great-grandfather!) in preparation for drilling, sorry entertain, our new team member. He was very disappointed and very upset; we have actually witnessed shark tears, to learn that April Fools is a joke and that we will not be using a shark wrangler.

These are excerpts from some of our favorite candidates. They gave us a good laugh!

Warren of London said "I am ABSOLUTELY the right candidate for this position.
I've had experience fighting against the Bears on a mountain and a large survival knife skills.
Bearing in mind that the shark is inflatable Indeed, it should not be too difficult to control, but I can provide satisfactory service in case of imminent or lion zombie attack. "

Dimitrios Arab Emirates said "I have no throwing knife skills whatsoever and does not bear resemblance to Steven Segal or even Jason Statham However, do not let my LinkedIn profile photo and recommendations fool you. behind the serene, friendly and compassionate exterior is a person who does not stumble, hesitate or lose focus, I am deadly-accurate in hitting the target, maybe not with a knife, but certainly with a shotgun (were a member of the Greek Olympic trap and double-trap of national teams). If the test designated target to flee, I can always try to wear them, I still am committed in medium / long-distance running. "

Aaron UK said: "In a competitive market employees threatening to" meet the shark "is a great tactic to increase productively and policing However, if you hired me I'd be. still feel compelled to tell inappropriate jokes and disturbing others while they're coding away, drinking coffee or beta test. But the user experience is seriously UX shortcut instead of the EU because it sounds cooler that is turn makes coders sound a little more impressive than they actually are. "

Nigel is currently hovering slightly deflated, looking out the window, and now without wrangler in mind, hopes to be able to steer clear of sharp objects and hopes that the office does not have the float. ... Clown fish. Shudder!

Are we approaching the end of net neutrality?

11:54:00 AM Add Comment
Are we approaching the end of net neutrality? -

What is net neutrality? Net neutrality is the idea that all Internet traffic is treated in the same way; no ISP can block or discriminate traffic anyway, and it can not charge you more depending on what you use.

The debate over net neutrality has been raging for years, but it seems that things are accelerating. new rules proposed by the FCC Chairman Tom Wheeler, leaked last week, would allow internet service at two speeds, and allow ISPs to cut deals with streaming sites like Netflix and Amazon, which in turn could you pay more for faster speeds.

What does this mean for you?
ISP charge sites such as Netflix to be able to deliver their movies to a watchable speed. If Netflix refuses to pay the Internet service provider, for example Verizon, Netflix customers will get plenty of buffer, especially if they want to watch a movie in HD. So Netflix will pay the ISP, otherwise everyone will complain that their service is poor, and leave.
Essentially, it boils down to companies trying to make more money by creating high-end services. If net neutrality goes ahead, streaming sites such as Amazon will likely offer premium packages, however, these improved services would be a "lie" as what it really means is that many service streaming would be degraded unless you pay.
It is a bit like putting speed bumps on a road that was fine to begin with, then charge you to take them out again.
Thus, the Internet exists today, and what we consider the "norm" could be replaced by a new system, we pay extra to receive faster speeds (that exists today, with net neutrality!)

There is a solution!
ISPs are able to watch and monitor your traffic, and if, for example, watching a movie on Netflix, you may be asked if you want to buy the "premium package" ie one that will not slow down Netflix your show or movie.
So, you are watching a movie you've been dying to see, but, oh no, it's buffering, it is unwatchable. Your movie night is ruined; your popcorn is eaten, and the groove ass on your sofa you've worked so hard to lose happened!
But do not be afraid, because when you connect to a VPN server (HMA! Pro VPN is your best bet!) Wrong ISP, because you have changed the IP address. Because the ISP can not see your online activities, it leaves your bandwidth speed alone, without limitation, and therefore it is unable to detect that you are watching a Netflix movie. Hoorah - problem solved

The FCC will meet May 15, 2014 to decide the future of the internet and net neutrality, but even if they press forward and end the Internet as we know it, it is good to know that HMA! Pro VPN is here to help you get around this!

Europas Awards 2014

10:53:00 PM Add Comment
Europas Awards 2014 -

We were delighted to sponsor / Trust for Best Security Europas the ceremony held in London on Tuesday night.

Founded in 09 by Mike Butcher (editor usually TechCrunch.com) the Europas is Europe's answer to the United States Crunchies, giving technology startups that are not based in Silicon Valley or in London, the opportunity to show their tech talent. The event brings together like-minded thinkers and companies under one roof in celebration of all things technology.

finance sectors

Last night tech-sequins event welcomed 800 guests, technology, media, and which party hard at night to celebrate the many recent successes Internet companies in Europe.

last year, Mike Butcher entered by riding on a Harley Davidson, performance this year by the winner of Eurovision Conchita Wurst was featured -. although some say he was a lookalike

judges included some of the most known and respected technology journalists, investors and entrepreneurs in the business, including YouTube co-founder Jawed Karim, and journalists TechCrunch, Wired and investors Google Ventures

category / privacy Best security was one of four new award this year and won by ZenMate -. a Berlin company privacy, and the presentation was made by our COO, Danvers Baillieu. Danvers was a regular Europas since 2010 when he picked up the "Best service provider for start ups", in his former capacity as the founder of Bootlaw.

We are very proud to have been part of this event for startups and European investors, and look forward to 2015. Europas prices

You can view the complete list of winners by visiting their website

HMA! team

British government rushed through emergency legislation to "protect" Britain

9:52:00 PM Add Comment
British government rushed through emergency legislation to "protect" Britain -

Danvers Baillieu
Thursday (10 July 2014), the British government issued an emergency law, which is precipitated by Parliament next week, to strengthen the powers that can be used to force all communication service providers to store meta data for 12 months. The bill also stipulates that foreign companies will have to comply to communications data requests made by the British authorities.

In April of this year, the European Court of Justice ruled that the existing powers to force ISPs and other companies to open an Internet session and phone records of people is invalid. Without this ability, the British government apparently can not keep the country free "criminals and terrorists." But activists much privacy and digital rights such as The Open Rights Group are concerned that this is going to invade the privacy of individuals.

bills were apparently secret agreement by all major political parties in the UK and are expected to become law in a matter of days . This coincides with increased concerns about jihadi terrorists and security checks increased in the UK and US airports, however, the British government has told the BBC that the time is linked to a campaign to get media companies to comply with the ruling of the European Court in April.

What this means for HMA! Pro VPN?

The data retention bill and Investigations Powers only applies to metadata and not the content of emails, calls or texts. However, in the case of a VPN service such as ours, this would include all log data. At present, this is not a change in the laws of the UK and it still requires the UK Home to a specific order for a single company to comply. To date, these powers are not used to constrain HMA! retain data for 12 months, and in the state, we have given no indication that this position will change.

The other part of the proposed legislation is to extend the right of the British authorities to request data from foreign companies. Again, this has no impact on us that we are not a foreign company, and it is more likely to be directed against companies such as Twitter and Facebook that have a presence in the UK, even if their servers are controlled abroad. !

here in Hide My Ass, we keep an eye on developments and last night, we were presented a Channel 4 News report on this subject:

Be the first to test run the new HMA! Mac client

8:51:00 PM Add Comment
Be the first to test run the new HMA! Mac client -

We are very pleased to release the beta version of HideMyAss! V2.0.15.4 VPN client (for Mac) and put it in the hands of our users

New features and improvements :.

  1. All major icons have been redesigned to give a sleeker, more contemporary look and are optimized for Retina displays
  2. HMA! Pro VPN now supports the menu bar, allowing you to control your VPN connection; connect, disconnect and change IP
  3. Users' can now repost the application when it is minimized
  4. proxy settings We also made more user friendly, offering an experience even better using HideMyAss!

Please note that we are now frozen support for the OS X version 10.6 to version 1.17. Customers using OS X 10.6 (Snow Leopard) can continue to use the version (v1.17) exists which is downloadable from our website.

We always welcome any comments or questions you might have if, please, do not hesitate to let us know on our Google page Beta Community.

Does VPN Netflix blocks?

7:50:00 PM Add Comment
Does VPN Netflix blocks? -

In May earlier this year, Hulu, film service and television in popular streaming blocked a number of VPN users to be able to access to its network.

the question on the lips of thousands of Netflix customers in Australia at present is whether they will be blocked from accessing the American version of the streaming service. Currently, Netflix is ​​not available in Australia as Australians would pay for a Netflix subscription and use a VPN to bypass geographic restrictions in place. This means they can "virtually" live in America, and watching Netflix Americans.

However, according to TorrentFreak some members of major studio entertainment, including Warner Bros., Twentieth Century Fox and Sony Pictures who are represented by The Home Association Distributors Entertainment Australian (Aheda) want Netflix to block users or even ban the users who use a VPN (Virtual Private Network) to access the service.

Why is this happening? Well, it basically boils down to the cost of licensing and how rights are managed for TV shows and movies. For example, the studios that own the rights in America are losing money when users access content outside of the States, and they are not happy. Not one bit.

VPNs Banning is wrong!

Of course, it is impossible to ban all VPN access as Hulu discovered, but it is also wrong.
For example, an American who travels to Australia, would not be able to access their Netflix account even if they have paid for it. This does not seem quite fair, now does it? And if Netflix does bow down to pressure and blocks VPN users, they would also block Netflix users in states that use VPN to protect their personal and confidential information. One or two Internet service providers in the United States were found in bandwidth speeds and download accelerator on many video streaming sites such as Netflix, many Americans use a VPN to get around this so that they can stream TV shows and movies without any problems speeds.

A VPN is not all about access to geo-restricted content, it secures devices using Wi-Fi and protects your data from prying eyes and also allows you to surf the web anonymously. Privacy tools should be encouraged, not discouraged

Netflix users have paid for the service !; it should not matter if they are in the US, UK or Australia, they are legitimately pay for it, not illegally download material from a torrent site. TV and movie studios would be wise to remember that!

For more information, please visit our website.

New version of HMA! VPN client for Windows Pro v2.8.11.1

6:49:00 PM Add Comment
New version of HMA! VPN client for Windows Pro v2.8.11.1 -

We released a new version of HMA! VPN client for Windows Pro v2.8.11.1 which addresses the issue with non-Latin (eg Cyrillic) alphabet Windows systems, which crashed when launched, so that the client could not load initial data.

Example of connection log:
error LoadIpInfo: Указанное значение содержит недопустимые знаки управления. Имя параметра: value. Retrying ... Attempted 10 1
LoadStaticData error Указанное значение содержит недопустимые знаки управления

If you encounter this problem, install the new version should resolve

How to .. Download : Login to your account here and go to the download page and install the new version
If you have any update problems or found a bug, please let us know

we always like. you hear, and to improve our service where we can, so please feel free to send us an email or leave a comment here on our blog, or forum.

North Korea Foreign blocks access to Facebook and Twitter!

5:48:00 PM Add Comment
North Korea Foreign blocks access to Facebook and Twitter! -

Kim Jong-Un is back in the driver's seat after mysteriously disappearing from the public eye for about 6 weeks. He returned, but with a walking stick - and an official explanation of his absense, of course, was not given. Some reports say he had an operation to remove a cyst ankle, although I lean more towards the theory that he broke it after gorging on too emmental. But now he's back and he is certainly making up for lost time. Oh, and he no longer walk with a stick, happy days in North Korea! * Sarcasm * intentional

The reports of the Russian news agency TASS emerged that Pyongyang imposed a national ban on Facebook and Twitter. This now means that foreign visitors, diplomats and humanitarian organizations were a small handful of people who could use these sites will not be able to. This is the first time that Pyongyang has blocked foreign access to social media networks, and again, no reason was given for the ban. Whether permanent or temporary ban has yet to be seen.

Recently NGOs, embassies and other foreign organizations were banned from using Wi-Fi, for security reasons. It really looks like Pyongyang is serious crusade to tighten its grip on most communications in the state.

Internet access is mostly inaccessible to ordinary North Korean citizens, mainly those from elite families, universities, and a number of research institutions, factories (probably cheese ), have access to Kwangmyong -. the country that provides intranet content Korean Central News Agency (KCNA) and other approved government propaganda

An interesting article by Tim Urban Huffington Post who visited the country last year was told a north Korean guide "No north Korean people have access to the Internet because the government fears that people would see things that would feel unfairly critical of the West and the government wants to protect the reputation of the West preventing people from going on the Internet. Ah, so they care about us, they block the Internet to protect our good name! It makes sense now.

at HMA ! we all deplore government censorship, which is why we launched our campaign the Riot Pussycat against it. You can show your defiance against dictatorial leaders like Kim Jong-Un publishing cat videos, and photos using #ThePussyCatRiot. You can also buy litter boxes for cats featuring the faces of some of the internets most popular Internet dictators. All proceeds go to the charity Index on Censorship. And do not forget to watch our video 'The Dictator' -. That captures the ridiculousness of these blocks on the sites

I bet Kim Jong-Un can still access an open Internet, and asked "how to beat your addiction to cheese?"

to more information about HMA! Pro VPN, visit our website or email us or contact us via LiveChat.

How to use the incognito mode, hide clear and disable location services for Safari (Mac OS)

4:47:00 PM Add Comment
How to use the incognito mode, hide clear and disable location services for Safari (Mac OS) -

In our recent article "How to stop websites to know your position" we explained how a website or a service can always recognize your location even when you use a VPN or proxy

Fortunately all browsers include features that allow you to :.

  • surf the net without leaving any traces on your computer (using "private browsing" or "incognito")
  • Clear cache files (cookies, temporary data, images, web sites)
  • followed by the services Disable / location (to prevent websites to know your position)

This tutorial shows how you can disable location services on Safari (Mac OS) and how to clear your machine from navigation data cached.

do not forget, there are a number of other ways a website can still recognize you, so be sure to visit our Help Center and Forum for more tips!

Instructions how to clear the cache, disable location services and how to use incognito mode on Safari (Mac OS)

to use "incognito"

Go to the Safari menu and select " incognito "

a10.png

to clear the cache

Go to the Safari menu and select " clear Cache"

a11.png

another way to clear the cache is using the " Reset Safari " option in the menu. It will open a window like the screenshot below.

You can leave everything checked to remove all traces of your usage, then click " Reset ".

An important point to note is " Reset all location warnings ", which revokes all permissions given to websites, enabling them to share your location.

a12.png

disabling location services in Safari only or fully Mac OS

If you want to disable location services features in Safari 5 only (Mac OS X v10.5, 10.6, or Microsoft windows): ..

  1. with Safari running, choose Preferences of Safari menu
  2. Click the security tab
  3. Clear the "Allow sites to ask for location information" checkbox

If you want to disable the service location in Mac OS X 10.6 :.

  1. of Apple menu, choose System Preferences .
  2. Of See menu, select security .
  3. Click on the general table
  4. If the icon in the lower left corner is locked, click it to authenticate using your admin password (to unlock the Security pane).
  5. Click the " Disable location services " check box.

Look out for our next HMA! tip that will show you how to turn off location services on Google Chrome, or if you can not wait, you can always head to our Help Center.

How to use the incognito mode and clear cache on Internet Explorer

3:46:00 PM Add Comment
How to use the incognito mode and clear cache on Internet Explorer -

We recently showed you " How to stop websites to know your position " d explain how a website or a service can always recognize your location even when you use a VPN or proxy.

We've covered how you can delete cached navigation data on your machine, and how to use incognito mode and files set clear cache for Safari (Mac OS), and Google Chrome.

This tutorial shows you how to use the incognito mode, hide clear and also provides other privacy options and localization of Internet Explorer as luckily IE does not have built-in location services

first, you must ensure that you use the latest version of Internet Explorer -. visit Windows Update .

Now, let's take a look at the options we have in the " tools " menu.

If you do not see the "Tools." menu, simply press the ALT key while Internet Explorer is running and the pop-up menu

here we have:

Delete browsing history (CTRL + SHIFT + DEL)

This is a useful option will clear all kinds of cached data that can reveal your location and also allows web sites know if you've ever visited ( . for example, if you visited a website using a foreign IP address)

in the next window, you must select the following options, then click " Clear "

Internet files -Temporary
-cookies [1945008données] -ActiveX filtering and protection against tracking

InPrivate Browsing (CTRL + SHIFT + P)

This opens a new browser window " Incognito Mode ". This prevents the browser from caching data and disables extensions and toolbars, and also prevents them from using the data previously cached that can reveal your location or recognize you.

You can use this to test whether a site is blocked or locate you using cached data.

tracking protection

With the tracking protection feature, you can download lists that help to block content sites that are known to track your location and personal information.

a.png

do not forget, there are a number of other ways a website can still recognize you, be sure to visit our Help Center and forum for more great tips!

VPN server in Taiwan and 28 new locations added

2:45:00 PM Add Comment
VPN server in Taiwan and 28 new locations added -

We have a huge update the VPN server for you - almost in time for Christmas! Since our last update, we added 29 servers, 4073 IP addresses, and 13 new countries in HMA! Pro VPN network. We added servers in many cities, including a VPN server in Taiwan, and in Worthing, Barbados. In addition, we added another VPN server in Australia

The details :.

USA, Florida, Miami (VPN server Loc 1: 11-12) (337 IPs)
Norfolk Island, Kingston VPN (124 IPs) (new location )
Germany, Berlin (VPN server 1 Loc 1-2) (246 IPs)
Macau, Macau VPN (124 IPs) (New Location)
Falkland Islands, Stanley VPN (124 IP) ( New location)
Christmas Island, Flying Fish Cove VPN (124 IPs) ( New location)
New Caledonia, Noumea (VPN 124 IPs) ( New location)
Niue, Alofi VPN (124 IPs) ( New location)
Tokelau Atafu VPN (124) ( New location )
Anguilla, The Valley VPN (124 IPs) ( New location)
Bermuda, Hamilton VPN (124 IPs) ( New location)
Barbados Worthing VPN (124 IPs) ( New location)
Montserrat, Plymouth VPN (124 IPs) ( New location)
Saint Vincent and the Grenadines Kingstown VPN (124 IPs) ( New location)
France, Paris, Clichy-Levallois VPN (Loc 1 Server 4) (122 IPs)
France, Paris, Aubervilliers VPN (1 server Loc 3-4) (244 IPs)
Taiwan, Taipei (VPN server 5 Loc 1) (124 IPs)
Italy, Lombardia, Milan VPN (Loc 3 servers 1-2) (252 IP)
Germany, Hesse, Frankfurt VPN (Loc 1 servers 5-8) (496 IPs)
Portugal Leiria VPN (252 IPs)
Hong Kong, Kowloon VPN (256 IP) (new location)
Australia, Victoria, Melbourne VPN (Loc 2 Server 1) (256 IPs)

Hide My Ass! a VPN servers in 50 US States! For more details see our list of USA VPN servers!

If there is a country or location that you want a VPN server, please let us know by commenting here on our blog.

Visit our main website for more information about HMA! Pro VPN servers.

How can I configure DD-WRT router using PPTP?

1:44:00 PM Add Comment
How can I configure DD-WRT router using PPTP? -

In this tutorial, we'll show you how to configure your DD-WRT router using PPTP. Using PPTP and L2TP (discussed next week), is much easier to install than using OpenVPN, and is generally faster than using L2TP.

If you have problems with the speed, or experience problems connecting, you should try using all three protocols (PPTP, OpenVPN and L2TP.)

For set your DD-WRT router using PPTP, you'll need a router with DD-WRT firmware installed last. If you are not sure if your router supports DD-WRT firmware, then please check their list router database or supported devices . The firmware used in this tutorial is "v24-sp2 (08/07/10) std" with D-LINK DIR 0.

NOTE :. If you need help, please read this article carefully and completely DD-WRT troubleshooting because it covers most of the questions and solutions

Okay, so let's start. Here are the instructions for the DD-WRT firmware:

1. Go to the DD-WRT Control Panel (usually http://192.168.1.1/ - default user name "root" password "admin")
2. Configure
3. basic Configuration
4. WAN Configuration
5. connection Type: PPTP
6. Use DHCP Yes
7. Gateway (PPTP server): Enter one of the server IP addresses that you can find by logging on VPN control panel and clicking " Software & Support ". Then click on " See " next to " manually set-up VPN - No software "
8. Username: VPN Your account name user
9. password: Enter your PPTP password . Find this in the VPN Control Panel and click on " Software & Support ". Then click on " See " next to " set-up VPN manually - No software "
10. Login Policy: Keep Alive: Redial Period - It is your choose how many seconds you choose. We recommend a minimum of 30 seconds
11. PPTP Encryption :. Enable
12. Disable Packet Reorder: Enable
13. Other PPTP options: mppe necessary, stateless
14. STP: Disable
15. Leave everything else as it is
16. Save and Apply

it should look like this when finished:

PPTP configuration with DHCP disabled

PPTP configuration with DHCP enabled

need help?
If you need help with setting up your DD-WRT router, please take a look on the following pages:

  • router support HideMyAss forum
  • router related tutorials


DD-WRT:

  • DD official website -WRT
  • support DD-WRT forum
  • DD-WRT downloads
  • DD-WRT supported router database
  • List of supported devices
  • Installation tutorial DD-WRT firmware
  • DD-WRT firmware FAQ
  • DD-WRT Wiki

If you have questions or need help setting up your DD-WRT using PPTP, do please send us an email.

Visit our website for more information about HMA! Pro VPN, VPN routers and also recommended our HMA! Help Center for more tips and how to's!