VPN server in Utah, Salt Lake City has added

9:15:00 PM Add Comment
VPN server in Utah, Salt Lake City has added -

We have added 5 new VPN servers in Utah, Salt Lake City, United States to our network VPN:

Here are the details:

  • United States, Utah, Salt Lake City (VPN LOC1 S1) - 123 addresses IP
  • United States, Utah, Salt Lake City (VPN LOC1 S2) - 123 IP addresses
  • USA, Utah, Salt Lake City (VPN LOC1 S3) - 123 IP addresses
  • USA, Utah, Salt Lake City (VPN LOC1 S4) - 123 IP addresses
  • United States, Utah, Salt Lake City (VPN LOC1 S5) - 123 IP addresses

This brings the total to 122 VPN servers in 27 countries with 13,096 IP addresses!

Hide My Ass! a VPN servers in 50 US States! For more details see our list of USA VPN servers!

VPN server Phoenix, Arizona added to our network!

8:14:00 PM Add Comment
VPN server Phoenix, Arizona added to our network! -

1661 VPN and IP servers to our VPN network including a VPN server in Phoenix, Arizona. This month, we also added multiple VPN servers in Cairo, Egypt

Here are the details:

  • Egypt Cairo VPN (LOC1 S2) - 16 IP addresses
  • Egypt, Cairo VPN (LOC1 S3) - 16
  • IP
  • Egypt, Cairo VPN (LOC1 S4) - 16 IP addresses
  • Egypt, Cairo VPN (LOC1 S5) - 16 IP addresses
  • United States, Pennsylvania, Scranton VPN (LOC2 S1) - 128 IP addresses
  • India, Andhra Pradesh Hyderabad VPN - 63 IP addresses
  • USA, Arizona, Phoenix VPN (LOC1 S5) - 128 IP addresses
  • USA, Arizona, Phoenix VPN (LOC1 S6) - 128 addresses IP
  • USA, Arizona, Phoenix VPN (LOC1 S7) - 128 IP addresses
  • USA, Arizona, Phoenix VPN (LOC1 S8) - 128 IP addresses
  • Country -Bas, Amsterdam (VPN LOC2 S2) - 126 IP addresses
  • Netherlands, Amsterdam (VPN LOC2 S3) - 126 IP addresses
  • Netherlands, Amsterdam (VPN LOC2 S4) - 126 IP addresses
  • USA, Arizona, Phoenix VPN (LOC2 S1) - 129 IP addresses
  • USA, Arizona, Phoenix VPN (LOC2 S2) - 129 IP addresses
  • USA, Arizona, Phoenix VPN (LOC2 S3) - 129 IP addresses
  • USA, Arizona, Phoenix VPN (LOC2 S4) - IP 129 addresses

this brings the total to 175 servers in 32 countries with 19,727 IP addresses. For a complete list please go to our VPN servers.

HMA! now has servers in each state of the United States. See our list of USA VPN servers and let us know what you think of them!

Do not forget to read our VPN comments and see what our customers have to say About us!

Affiliate - Payoneer officially added as payment option

7:13:00 PM Add Comment
Affiliate - Payoneer officially added as payment option -

We are happy to announce that we have added Payoneer (http://payoneer.com) as official payment method our affiliate service. Payoneer provides applicants with their own debit card, and the 25th of each month our system credits this debit card with your commission earned. To change the payment method to simply login to Payoneer https://affiliate.hidemyass.com and go to your account settings page.

fraud online data upward

6:12:00 PM Add Comment
fraud online data upward -

The amount of online data theft and negotiated by cyber criminals has reached record levels this month, with the British do is to take steps to increase their security online in the digital age.

figures show that nearly 12 million pieces of personal information collected from unprotected machines and Internet connections have been sold on the black market in the first three months of 2012, dwarfing the total of 9 5 million for all of 2010. research conducted by the credit checking service Experian, cites the growing number of online accounts held by consumers associated with lax security online as the main reasons for the increase.

The vast majority of data sold consists of connection account names and combinations of passwords, first stolen either from the machine of a person over an unsecured wireless connection or websites. These credentials are then used to access the accounts of users who use the same password for multiple websites.

The news follows several password theft revelations by large online businesses, including professional social network LinkedIn and email provider Yahoo, which have failed to keep their data secure users. Britons now have an average of 26 individual accounts online, only use an average of five different passwords for all access, making the potential impact of a much broader violation that must be safety.

While you can 't do much to protect against security vulnerabilities of a web site, you can ensure that your connections are secure to sites using a VPN service. The use of simple and affordable technologies, such as a decent VPN can help reduce the amount of data stolen by hackers, keeping your personal information, even using unsecured wireless connections. Using a VPN to ensure a secure connection can go a long way to make your online business more secure, even if users are also encouraged to vary their passwords as much as possible, so that hackers will only have access to limited data if the password is hacked or bought online.

online security is becoming increasingly important for the new generation of tech-savvy who are more comfortable with free wireless hotspots, which can leave their machines vulnerable attacks by criminals looking to sell their data to the highest bidder. Using a reliable VPN service can secure your data while you surf at your leisure.

Android use ... but is it safe?

5:11:00 PM Add Comment
Android use ... but is it safe? -

When Apple launched the iPhone in 07, it was hard to imagine another smartphone competing in a serious way. But later that year, along came the first Android system operated. In 3 years, Android surpassed the iPhone in the smartphone market, according to reports this week, its market share is now 64% and growing.

flexibility and wide range of Android handsets meant he was a winner with consumers. However, it is precisely this flexibility that has been a constant problem for the company. While the iPhone is certainly not immune to security breaches, the open source nature of Android that has helped make it such a success also leaves vulnerable to hackers.

As people buy more and more Android smartphones, so hackers are becoming more and more interested in them. Indeed, in the second half of 2011, the amount of Android malware there increased by 500%. So how make the most of an Android smartphone without end up carrying around a bomb mounted virus in your pocket?

As the normal good practice, such as making sure you have updated antivirus software and you are careful about what you click on, it is highly recommended to use a virtual private network, or a VPN service. A VPN service provides a way to browse the Internet anonymously. It uses an additional layer of encryption, which makes it harder for hackers to access your private data. If you connect to the Internet via public WiFi networks, then using a virtual private network is essential because a greater number of potential threats will have access to your connection.

There is some myth that all pirates as a challenge; give them an obvious or easy target and they'll pounce on it with joy. It seems that Android smartphones have become an easy target for these cybercriminals; Protect yourself and your phone, keep your data encrypted and help keep the remote hackers.

Government intervene to advise companies on

4:10:00 PM Add Comment
Government intervene to advise companies on - online security

Most people who own or use a computer, either at work or at home, are aware danger of viruses and hackers pose to online security, but very few are aware of the toll that Internet attackers take the British economy.

it is estimated that in total, the cost to individuals, businesses and government equivalent to about £ 27 billion a year -. with the hardest hit companies, losing about 21 billion £ a year in revenue

despite this figure, a survey conducted earlier this year among UK businesses suggested that nearly nine out ten feel their online security was adequate. Commenting, Iain Lobban, director of GCHQ - electronic intelligence unit of the British government - said "this confidence is misplaced"

It is perhaps because of such a gap. perceptions of entrepreneurs about their online security, and the economic reality of Internet attacks that GCHQ take a leading role in advising companies on how to counter these threats

week last, GCHQ unveiled "Cyber ​​Security for Business' -. a program that will bring together CEOs and presidents of large companies, representatives of the security and intelligence agencies and ministers in the British government to focus on the "20 Critical Control Top for effective cyber defense" and outline how cyber attacks threat has increased over the years.

Although no details are available at this time about what GCHQ recommend in their list of "critical controls" if the information is something similar to that published by the SANS Institute the US and the Canadian security intelligence, it is almost certain to contain measures that use a virtual private network, or VPN service.

a VPN encrypts all information flowing between a user's computer and the Internet, including email logins, web searches, and the IP address of the user. Using a reliable VPN service can be considered as the first step to ensure that the identities and valuable information about the network or client is kept well hidden for "nosy".

The fact that the British government sees the need for further intervention, despite the fact that a national cyber security program £ 650m is already in place, highlights the extent of the threat to businesses and individuals in the UK.

risk of malware online upward

3:09:00 PM Add Comment
risk of malware online upward -

According to a new security experts to report online from Blue Coat Systems (BCS), the amount malicious malware circling the internet is set to increase exponentially in the coming months, with criminal groups tripled the amount, Äúmalnets at used to launch attacks on unprotected machines.

Malnets physical servers are required to manage the operations of large-scale malware, and BCS said it is currently monitoring 1,500 of these servers, against only 500 in 2011. This disturbing development indicates a shift to an aggressive campaign the distribution of malware and computer control. Malware can be used to take control of a machine without owner, AOS knowledge and use it to send hundreds of thousands of spam emails from around the world, while also driving private information.

Security companies have noticed a number of new malnets recent months, with the most successful supposedly control up to 5000 virtual servers, which can in turn give access to a gang to the data contained in millions of individual computers. The main source of this malware infection has so far been through false links placed in the search engines and spam email, although most illegal online activities also carry a risk.

The surge in the number of malnets is said to be in response to the successful closure of a number of, Äúbotnets at during the past year, including the infamous Grum botnet, which was responsible for 18% of the world, AOS total amount of spam. The closure of these vast networks of zombie computers has forced a change in tactics for criminal gangs, who are now increasingly easy to infect computers, steal data and develop their network.

We must all be very careful online, ensuring that we don, AOT the links without first being sure of their validity. However, there are other processes that we can put in place to strengthen our online safety and help reduce the risk of being infected by malware. One of the most effective ways to ensure that your data remains safe and secure is to use a VPN service. A VPN service will hide your identity online, making it much more difficult for future fraudsters to spy on the activities of your browser and read all sensitive data. With analysts predict strong growth in the amount of malware and other online fraud like to continue in the coming months, a VPN service is the first line of defense to help fight third party interference in your personal questions.

US ramps up the collection of personal data

2:08:00 PM Add Comment
US ramps up the collection of personal data -

The activists of a free and open online space have reacted with outrage this week on news that the US is trying to build a huge data storage center to accommodate the ever-increasing amount of personal data collected from citizens every day.

new development is the pet project of the US National Security Agency (NSA), which has broad powers that allow it to access personal data without permission and store it indefinitely. Estimates indicate that the data center will have sufficient capacity to store more than 100 years of communications value worldwide. The new center is the culmination of a month of worrying revelations about online surveillance policies of America, with the American Civil Liberties Union (ACLU) expressing concerns over the amount of data being systematically harvested from machinery innocent users.

unreasonably electronic surveillance has allegedly been on the rise in the US for some time, with a large number of public institutions, including the FBI and the police collection, storage and sharing data without permission. Figures seen by the ACLU indicate that Americans were subjected to several forms of electronic surveillance for the past two years than for the whole of the previous decade, in which important privacy issues online light.

A number of public safety laws were introduced by the government to expand their surveillance powers, with figures showing that "steals emails and stores 1.7 billion calls, texts and other electronic communications "NSA every day. This large-scale data collection seems to be both excessive and unjustified, with a former NSA employee claiming that the anti-terrorism legislation is being used to spy on ordinary citizens.

Although it seems that everyone from cyber criminals to legitimize governments seem to be trying to snoop on our private information, using a reliable VPN provider is a method to help keep your data safe from view prying. A VPN provider will encrypt your Internet connection, helping to mask your location and keep your personal information safe while you are logged in, leaving you free to surf the web with peace of mind.

Symantec provides increased online threats

1:07:00 PM Add Comment
Symantec provides increased online threats -

The online security market is set to be pushed to its limit in the coming months after leading the company anti -virus Symantec announced a number of worrying security predictions for 2013.

Symantec released its first five online security predictions for 2013, with a catastrophic increase "ransomware" as their top concerns. This relatively new form of threat allows cyber criminals to take control of a user's system, lock and demand ransom before allowing them to reconnect. Those who pay generally discover a large amount of personal data was also collected, making it one of the most dangerous forms of malware.

In addition to the rise of traditional laptop and desktop-based threats, mobile users are also set to come under increased fire potential hackers over the next 12 months, the mobile adware also allowed to grow. According to recent statistics, 2012 has seen a 210% increase in the amount of recorded cases of aggressive mobile adware, and that number is only expected to grow as mobile becomes the dominant form of online connection.

The mobile threat is also planned to extend to social networks, Symantec also posturing that sites such as Facebook, Twitter and Linkedin become targets for criminals who seek access to sensitive information and payment personal details. Personal data black market has also experienced tremendous growth over the last year, and with more and more users voluntarily give up their information to social networks, the problem should not become worse. Rogue Facebook ads are also known to be a major source of malware infections, affecting users who are reluctant to take appropriate security measures.

These predictions go a long way in justifying those who have already started using a VPN connection, which allows users to keep their data safe while browsing the Internet. A VPN connection encrypts all data that passes through, allowing users to increase the first affordable and effective line of defense against the alleged pirates. In addition, you can now use a VPN connection to your mobile device, helping to fight against these threats and to come.

Restricted

12:06:00 PM Add Comment
Restricted -

laptop-screen-padlock Whether or not you agree with the actions Julian Assange and WikiLeaks organization, they have certainly changed the security game line. The case of Bradley Manning scandal shocked many in America, particularly because the source of the leaks came from within. Increasingly, government auspices focus inward, seeking to encroach on the freedom of the Internet to strengthen their national security.

The beginning of 2012 saw the introduction of SOPA, a controversial bill aimed at amalgamating Internet freedom with the right to intellectual author. SOPA was met with strong opposition and was defeated, but some see its sister bill, CISPA as simply more of the same. To WikiLeaks, freedom and Internet security have largely been left to private companies, and has been regarded as a matter of piracy and intellectual property laws. Since then, however, governments have adopted a much more active stance against Internet activities, and raised questions about his land status of a no-man law.

Perhaps the most frightening manifestation of the level of "interest" that governments around the world are in this debate is the recent failure of the Internet, held in Syria. Despite claiming a coordinated terrorist attack, most likely circumstance seems to be that the servers were simply programmed to stop the transmission of data, effectively making Syria a free zone of the Internet. The advantage of this was that they had the cover of darkness. Apart from the reports of eyewitnesses, no one could tell what was going on in Syria. So they were irresponsible in the world.

Although most countries around the world can claim to have a sufficiently stable government for not using such tactics of brute force, it is undeniable that most have an incentive to restrict freedom on the Internet. A VPN provider may offer some protection to users. By hiding the location of the user, a VPN provider allows bypass certain restrictions in place to prevent access to the Internet. Content in many countries remains mostly unrestricted, but with the interest of the collection of international security online, this can not last forever.

Even former presidents are not safe: pirate exposes emails Bush

10:04:00 PM Add Comment
Even former presidents are not safe: pirate exposes emails Bush -

A hacker who goes by the name of Guccifer managed to hack the personal email accounts of friends and relatives of former presidents George HW Bush and George W. Bush, the exposure of a large amount of photographs and emails. Even in retirement, it seems, privacy remains a huge problem.

A report by the magazine The Smoking Gun says that in recent communication with Guccifer, the hacker self-assured that he managed to drag "many things" that included "mails interesting "about George HW Bush at the recent alert hospital. Also included was a list of addresses at home, phone numbers and email addresses for many family members in October 2012.

The presentations emails from six separate email accounts including the sister of George W. Bush, Dorothy Bush Koch, former CBS sports and brother and family, a friend of the lady Barbara Bush, Jim Nantz. One leak emails have even included details of the PIN Nantz required to access the property of George W. Bush, as well as details of a reservation for dinner and the restaurant the pair planned to visit after a round of golf.

were also compromised the details of George HW Bush's recent hospitalization, revealing that the family was even considering planning a funeral in late-December, such was his condition. Accompanied by these emails were hospital president and pictures of the patient a message from President Barack Obama and his wife Michelle, expressing their well wishes.

The list of pirated items also included paintings that George W. Bush worked - including two self-portraits, candid him in the bathroom and shower. The attack further underlines that even personalities are still vulnerable to this kind of threat, especially when they are unable to use other security measures such as a VPN service.

Guccifer claims to have hacked "hundreds of accounts" and doesn 't seem to fear the prospect of the almost inevitable FBI investigation. In fact, Guccifer unfortunately appears hellbent on continuing its piracy wave. If you prefer not to have your self-portraits dinner reservation and exposed intimate information and then using a VPN can help make your personal data more difficult for hackers to access.

Do not let criminals to use your connection

11:05:00 AM Add Comment
Do not let criminals to use your connection -

unscrupulous criminals will do their best to hide their illegal activities from prying eyes of the legal system. Often their secret tactics will incriminate innocent users along the way.

Investigators in the United States recently sued an Ohio man for illegally downloading child pornography using a neighbor's Internet connection. The innocent neighbor had his home searched using a search warrant for child pornography. It was not until investigators discovered he had an unsecured Internet connection they realized anyone near their house could use the connection to perform illegal activities. When the search was expanded, the investigators found shocking images on a number of computers in a nearby property and Gabriel Jacoby charged with one count of pandering sexually oriented material involving a minor.

The investigators in this case said that anyone using a wireless router should make sure it is protected by password, illegal downloaders but have been known to go to extreme lengths to more deflect the blame of their crimes on innocent Internet users. To ensure your network at home or at work is protected against criminals who try to use it to unsavory practices that could land you in the center of an investigation, you should take all precautions the technology progress available.

a virtual private network, or VPN, provides such security layer around your computer network. The network works by allowing authenticated users to access the VPN, protecting your sensitive information against hackers or anyone who is not in your private network. Hackers often use spyware and malicious software to steal information and use a VPN can help keep your identity secure. This is especially useful when your laptop in a cafe, for example, where the wi-fi connection is often unsecured.

If you do not want to avoid becoming a victim of cyber criminals and want your private information to stay that way, a VPN service could help you and your family stay safe and secure when browsing online .

Are a team of American students of the answer to our problems of malware?

9:03:00 PM Add Comment
Are a team of American students of the answer to our problems of malware? -

computer-classroom-students A crack team of American students are to address online security headache that threatened more than a hundred American companies since 06.

the team is led by Wesley McGrew of Mississippi State University, and computer science students in engineering and specialized malware. Part of their new program requires them to study a recent report published by the firm Mandiant American cyber-security, which identifies a division of the People's Army of China as the likely release of authors years of cyber espionage.

According Mandiant, IP addresses behind a series of cyber attacks can be attributed to a "secret" Department of the Chinese army unit named 61398, located on the outskirts of the financial district of Shanghai. They believe that the unit has been in operation since 06, affecting 141 companies, mainly in America. Of course, the Chinese government has been quick to take allegations of Mandiant, noting that "hacking attacks occur almost daily using stolen IP addresses."

Is it true of the department's response? Perhaps, although considerable amount of activity in the area casts a shadow over their argument. The fact that the Chinese government takes a hard line on the online business, openly blocking many organizations and American companies, and the restriction of Internet freedom, has not exactly helped their cause. In recent years, many people in China were forced to rely on a VPN service to access the myriad of censored sites.

With every revelation of global cyber crime, companies worldwide are increasingly anxious, and increasingly dependent on the use of service as a VPN to help protect against threat. Unlike many, McGrew is rather excited by the news. He sees the report as a fantastic opportunity for students to analyze malware and to develop the tools to fight against potential threats in the future.

"We have a room with highly motivated students looking absolutely to enter this field. [Studying reports like this] puts them in positions that the country desperately seeking to fill right now," says McGrew. In Indeed, the university is also part of the US Department of Defense information assurance Scholarship Program that requires students to spend a year in government service for each year they receive financial assistance. - the idea being to US boost expertise in an area that badly needs it

The tables have turned: now North Korea is hacked off

8:02:00 PM Add Comment
The tables have turned: now North Korea is hacked off -

When hacking accusations start flying around the Korean peninsula, you usually expect to find North Korea at the center of the storm. This time, however, the tables have turned, and North Korea is actually accusing the piracy America several Internet services -. Including the official news service of the communist state and a Russian news agency

This digital ranting fighting comes at a time when tensions are already running high in the region. After North Korea's Kim Jong-Un made a third nuclear test last month, the UN sanctions clamped on his regime, which limits purchases of luxury items such as sports cars, popular with workers party of the country's elite. US Marines and South Korea have also conducted joint military exercises recently, and it was not well received in Pyongyang is ... Then came the hacking claims.

The Korean News Agency North (KCNA) said that cyber attacks were "intense and persistent", coinciding with the joint military exercises. Indeed, the MBC television South Korea KCNA reported that Air Koryo (North Korea airline of the State), Rodong Sinmun (the official newspaper of the party), and ITAR-TASS news agency of Russia all suffered disruption.

KCNA said he is "nobody's secret that the United States and the South Korean puppet regime massively strengthening cyber forces" in an attempt to disrupt North Internet, and also said the attacks are "every day on Internet servers operated by the DPRK (Democratic People's Republic of Korea)."

North Korea is not cyber angel himself, and often hit the headlines for his own hacking offenses including an attack against a south Korean bank in 2011. Although the North is adamant that it does intend to "strengthen" its ranks of hackers, defectors have said Pyongyang currently recruiting "thousands of software engineers for its cyber warfare unit". the experts within the US military said the threat of cyber-war North Korea is enormous, posing a threat major for the South and the United States.

Spy agencies in the United States even said that cyber attacks and espionage terrorism have exceeded the top security threat facing America - so now might be a good time to invest in a VPN. A VPN service adds an extra layer of protection to your computer and can help you feel more secure when browsing the web.

Two Japanese Internet portals hacked the evening - 100,000 user accounts locked

7:01:00 PM Add Comment
Two Japanese Internet portals hacked the evening - 100,000 user accounts locked -

If you have an account with one of the leading Internet portals in Japan - Yahoo Japan or Goo - then you might be in for some bad news. Last week, the two sites were hacked, with Goo reporting that up to 100,000 accounts (and financial details that went with them) had been affected.

The portal said he noticed several brute force attacks on its systems last Tuesday, with some accounts face 30 connection attempts every second. The company locked 100,000 accounts to prevent non-users from accessing personal information such as credit card and bank details. Goo asked everyone with an account to create a new password more complex, and said it is currently assessing the full extent of damage caused by the attack.

Meanwhile, the same evening, Yahoo Japan - which handles over 55% of research and using the portal in the country - said it had found malware on its servers. The malware has accessed the data of 1.27 million users, but the company says it was able to stop the attack before that sensitive information could be effectively extracted. Yahoo Japan has confirmed that the security breach takes very seriously and works hard to make it more secure site -. How very reassuring

Both Goo and Yahoo Japan insist that the attacks are not related, but with businesses being two of the most popular portals in Japan, it is hard to believe that this was not a coordinated ambush. Goo said he had managed to trace a handful of IP addresses used in the hack, but was not willing to release other details about them. Yahoo Japan, meanwhile, is yet to even begin to speculate about the origins of the malicious program.

Although you should not expect to have to worry about hackers getting into a major portal like Yahoo Japan Goo or by using a VPN, you can be sure that your computer is better protected attacks against undesirable users. A VPN service can give your computer an extra layer of protection against hackers when browsing the Web, which means that even if your favorite website has been compromised, you can be sure that your data are safer.

VPN server in Mexico added to our network!

6:00:00 PM Add Comment
VPN server in Mexico added to our network! -

We added 14 new VPN servers and 1761 IP addresses to Hide My Ass! VPN network including a VPN server in Mexico. Our users can easily connect to these places via our official Hide My Ass! . Software VPN Pro

We've also added the VPN server in Istanbul, Turkey

More details:

  1. United States, California, San Jose VPN (Location 1 server 2) (128 IPs)
  2. United States, California, San Jose VPN (Location 1 server 1) (128 IPs)
  3. Mexico, Mexico VPN (121 IPs)
  4. Republic of Singapore, Singapore (VPN LOC2 S1) (128 IPs)
  5. United States, Washington DC (VPN Location 1 server 5) (128 IPs)
  6. United States, Washington DC (VPN Location 1 server 4) (128 IPs)
  7. United States, Washington DC (VPN Location 1 server 3) (128 IPs)
  8. United States, Washington DC (VPN Location 1 server 2) (128 IPs)
  9. Florida, Jacksonville VPN (Location 1 server 5) (124 IPs)
  10. USA Florida, Jacksonville VPN (Location 1 Server4) (124 IPs)
  11. Florida, Jacksonville VPN (Location 1 Server 3) (124 IPs)
  12. United States, Florida, Jacksonville VPN (Location 1 server 2) (124 IPs)
  13. United States, Florida, Jacksonville VPN (Location 1 server 1) (124 IPs)
  14. Turkey, Istanbul VPN (124 IPs)

Hide My Ass! a VPN servers in 50 US States! For more details see our list of USA VPN servers!

You can learn more about our VPN service Pro

News Roundup: rental DDoS for 'sponsors FBI website, electric utilities face daily attacks from cyber and Microsoft may be reading your Skype messages

4:59:00 PM Add Comment
News Roundup: rental DDoS for 'sponsors FBI website, electric utilities face daily attacks from cyber and Microsoft may be reading your Skype messages -

DDoS 'sponsors FBI to hire "website

In the news rather disconcerting, it emerged that the FBI suspected of sponsoring a website" for DDoS rent. "the site in question is Ragebooter, specializing in flood websites with fake traffic to overload the servers, blocking real users connect. While owners claim that the service Ragebooter is quite legitimate, which allows "stress-test" site owners their servers and networks, observers question the FBI links on the site - and specifically why the organization seems to be followed by activity and IP addresses of users.

Power Utilities face daily cyber attacks

A report by members of Congress said that many US electric utilities are attacked by cyber criminals. Of the 0 surveyed utilities, more than a dozen claimed that the attacks occurred frequently, if not daily, with one utility putting the monthly number of attacks to about 10,000 attempted coups. Many commentators are branding the report as "exaggerated", however, arguing that most control systems are protected against this type of threat, and that the attacks almost never rise to a level that deserves the media attention.

Microsoft may be reading your Skype messages

You might have felt quite safe in the knowledge that your Skype conversations are private correspondence, but Ars Technica sets warning users to think again. The publication of the technology found that Microsoft scans regularly for messages sent on the service in an attempt to uncover fraud, and warned that no one knows what happens to that information later - it could be preserved for future reference or simply destroyed. It is likely to be bad news for Microsoft (which was launched a campaign against Google Gmail scans for some time), as well as service users who rely on its alleged privacy - such as activists at risk or journalists in contact with sensitive sources.

Turkish protesters use VPN to express their views

3:58:00 PM Add Comment
Turkish protesters use VPN to express their views -

major news outlets report that Turkish citizens protesting against Gezi Park redevelopment began using a private network virtual, or VPN, to spread their message. The increase in downloads of the service is considered a movement preempt anticipated government bans Internet services, including Twitter and Facebook. The initially peaceful demonstration that set up tents in the park exploded in civil strife since the police repressed the demonstrators. Protests have now spread across the country, and have come to be much more than the preservation of green spaces.

During the weekend, many protesters said they could not access the Internet and social media sites in order to coordinate their efforts. They believed it was the work of government, led by Prime Minister Recep Tayyip Erdogan. He commented in the past that social media "is the worst menace to society," singling Twitter as "the best example of lies," although he still keeps an account with 2.8 million followers.

In a move seen as similar to the movement "Arab Spring" of 2011, the Turkish demonstrators used VPN services to access social media and maintain communications between the different groups in the cities. This allowed them to continue to coordinate their efforts, bypassing the Internet and blocks thwart government attempts to overturn their voice.

Prime Minister Erdogan finally agreed to meet a group that hopes can mediate with the protesters, but the BBC reports that protesters say they have not been approached by the Prime Minister, speak to him if they were, and do not recognize the group selected as representative of their movement.

The clashes have left thousands injured and three died after 13 days of protests. Erdogan warned that "no more tolerance" will be displayed, but the demonstrations - and tweeting - continue independently. As Twitter user @ ela-suleymangil said, "The revolution will not be televised. It will be tweeted. "

VPN services can be useful even to those who are not boycott the blocks of the government acting to protect the security of your data when using the Internet. A VPN provides additional defenses between the information stored on your device and any other person trying to access it.

News Roundup: "fastest ever" 4G network, British Airways to relax mobile rules, and South Korea issues an alert cyber

2:57:00 PM Add Comment
News Roundup: "fastest ever" 4G network, British Airways to relax mobile rules, and South Korea issues an alert cyber -

South Korea to provide "the fastest ever '4G network

South Korean phone company SK Telecom says its new LTE-Advanced 4G network will allow customers to download files 150 megabits per second, ten times the rate of its current 3G service. the fastest 4G network in the UK is currently offering 75Mbps and even with plans in place to improve the service, users will not be able to download at faster than 100Mbps speeds. In practice, the SK Telecom users will not know the full potential rate, but the company says it will soon be fast enough to allow full HD video streaming as well as group video conversations in better sound quality and audio than ever. In order to access new download speeds, compatible devices are needed.

British Airways set to relax the rules on mobile phones

Airlines from other continents already allow the use of mobile phones and other devices immediately following landing, but so far, the European airlines have always applied keeping electronics out until the plane reaches the terminal. British Airways is set to be the first to relax these rules, with passengers able to use the devices as soon as the plane left the runway from July. Restrictions on the use of mobile phones during takeoff, however, will still be in force, and the devices must be switched off until the aircraft reaches 10,000ft.

South Korean government issued a cyber alert

South Korea issued a warning of cyber Tuesday after it emerged that the official websites and the media, including the presidential office website, were affected by what appears to have been a coordinated cyber attack. The attack took place on the anniversary of the Korean War 1950-1953 and left the official websites plastered with messages praising North Korean leader Kim Jong-Un, crediting group 'hacktivists' Anonymous with attacks . Anonymous denied any involvement in the attacks against South Korea but claimed responsibility for successful hacks into North Korean sites, including the official Korean Central News Agency. The North has yet to acknowledge or deny the attacks.

founder of the Internet Louis Pouzin adds its voice to global concerns about internet security

1:56:00 PM Add Comment
founder of the Internet Louis Pouzin adds its voice to global concerns about internet security -

While the world continues to panic about Internet safety, some of the founders of the company all have gone public with their own doubts about existing confidentiality measures. The last to speak was Louis Pouzin, the French engineer whose invention of the computer network Cyclades him one of five men makes with Sir Tim Berners-Lee and three American developers, who are credited with the creation of 'Internet.

Speaking at the World newspaper Pouzin reflects that "the Internet was designed without security measures ... the idea of ​​being used by scammers was marginal. We used to say, "We will deal later. 'He never seemed to be urgent. " Their discovery has opened so many amazing opportunities it is not hard to see why everyone is so passionate, but unfortunately, decades down the line of original inventions, we will certainly feel the effects of the lack of regulation.

comments Pouzin safety echo those recently by Sir Tim Berners-Lee when he and the other gentlemen received the Queen Elizabeth for engineering at Buckingham Palace last month (photo ). Berners-Lee released the famous words: "This is for everybody" during the opening ceremony of the 2012 Olympics and said when the fundamental principle of the Internet as "an open thing, he did not was something that could be controlled by any government "

he repeats this ethos when asked about the Edward Snowden claims surrounding the Internet monitoring '. when you do something universal ... it can be used for good things or bad things ... we just have to make sure that it is not undermined by large companies or governments trying of use and obtain total control. "

The two men have remained active in the campaign to protect their creation come under the monopoly of a nation or a particular company. Given the technology increasingly complex used by both "good" and "bad" kind, we will hope that the founders of the Internet still have what it takes to keep their invention on the idealistic track, began.

If you have concerns about online security in a way that you can use technology to help protect your privacy rather than expose it through the use of a VPN service. A VPN acts as an extra defensive layer to help keep your secure connection when using the Internet.

The governments' five eyes not trust Lenovo - should you

12:55:00 PM Add Comment
The governments' five eyes not trust Lenovo - should you -
According to a report of Australian Financial Review , the world's governments the world, including Australia, America, Britain, Canada and New Zealand, aka the "Five Eyes" have banned their intelligence services and defense of the use of computers designed by Chinese company Lenovo.
The report states that the ban has been in place since 05, the year that Lenovo acquired the PC arm of giant IBM computer. Although that company continues to do business in servers and mainframes for governments, Lenovo was abandoned. It has been suggested that this is yet another aspect of Prism revelations :. Since the five governments shared information using the same classified networks, it is obviously essential that all adopt the same security policies
justification of the ban is apparently due intense safety testing performed on computers that have found vulnerabilities not only in equipment but also in the firmware. The prohibition of the study and after specifically to "malicious circuits" and firmware built into the chipsets manufactured in China native of Lenovo. The tests, conducted by MI5 and MI6, discovered the potential for backdoor access to systems. This could actually allow people with knowledge of the system to remotely access any device, without triggering any alarm.
Reacting to the news, Lenovo rejected the old ban ten years or so, noting that the same governments still use their technology to unclassified networks. A Lenovo spokesman said its products have "been found time and again to be reliable and secure with our business and public sector clients and we always welcome their commitment to ensure that we meet their needs security. "
As indicated in the Daily Telegraph , the Home office of the UK refused to disclose if they make use of Lenovo products for secret networks of the United Kingdom in a press statement, GCHQ said: "As. a matter of policy we do not routinely discuss the names or the nature of suppliers GCHQ on all aspects of our business. "
If you have concerns about the safety of the computer, you can help to make your data more secure by using a VPN service. the VPN functions as an additional protective layer that sits between the data stored on your device and any external users attempting to access them.

15 days until the HMA Summer Sale!

11:54:00 AM Add Comment
15 days until the HMA Summer Sale! -

We are in mid-August, which means now there are only 15 days left of our summer sale. Do not leave it too late, take a HMA flight? Pro VPN subscription today.

With our 12 months plan receiving the highest discount (save over 56%!), It has been our most popular plane among our users. When you order a 12 months plan you will continue to receive 56% of sales were back on your renewals as long as you are with us.

Order today

"Critical" Facebook defects left images of vulnerable users in the removal by pirates

10:53:00 PM Add Comment
"Critical" Facebook defects left images of vulnerable users in the removal by pirates -

Indian researcher Arul Kumar has discovered a security flaw that allowed hackers to remove any image of the profile of a Facebook user without the knowledge or consent of the user.

the flaw has been rated as "critical" and worked operator support Dashboard Facebook, which is used to send pictures of requests to the moving company. These reports are usually to be seen by employees of Facebook or sent directly to the owner of the image with an automatically-generated link to delete the photo. When clicked by the user, the target image is deleted.

The new bug revealed that when sending those images, two parameters were left open and vulnerable. If a hacker changed owners and photo_id PROFILE_ID, they were able to bypass any user interaction and simply delete link sent to their own personal inbox instead.

The owner ID profile can be found with a simple search with Facebook Graph, and each image contains fbid value that can be found in a Facebook URL. Once the photo ID was pinned, two accounts of Facebook users can then be inserted in order to receive the necessary link to delete the image, with one person acting as the sender and the other as a receiver.

Kumar warned that the photo could be taken to a page or user, including shared and labeled images, pictures of groups and pages and images of proposed positions. The researcher has since received a bonus of $ 12,500 through the Bug Bounty program Facebook and the company said that the error has been corrected.

If you are concerned about the security of your personal data, then a VPN service can offer you added peace of mind when surfing the web. A VPN allows your computer an extra layer of protection when you use the Internet, helping to ensure that the information stored on your device stays securely defended against external forces trying to access it.

News Roundup: Yahoo in hot water on recycled e-mail addresses, Kaspersky Lab discovered hackers for hire and California passed a law to protect children ...

9:52:00 PM Add Comment
News Roundup: Yahoo in hot water on recycled e-mail addresses, Kaspersky Lab discovered hackers for hire and California passed a law to protect children ... -

Yahoo in trouble more email addresses 'recycled'

Back in June we reported that Yahoo was set to recycle and release inactive email addresses for public use. Many groups at the time predicted potential privacy issues, so it might not come as a surprise that the new owners of these addresses now receive emails intended for previous users. Professional Information Security Tom Jenkins, who took over an old account, said he now knows the name of the former owner, address, phone number and where their child attends school. Experts privacy urging Yahoo to take action before the personal information falls into the wrong hands.

Kaspersky Lab discovered the spying campaign

Kaspersky Lab discovered a group of hackers for hire called Icefog that have targeted military contractors and government institutions . Victims of the group were mainly in Japan and South Korea, but Kaspersky warned that it seems likely that they will soon hit a US company. The group is classified as an advanced persistent threat (APT a) but with a difference. Hackers go for high-profile victims and rely on a long-term plan that allows them to fly thousands of terabytes of data. Kaspersky has identified hundreds of individual victims, and while some Windows users dozens were affected more than 350 were using Mac OS X. Alarmingly, the "hit and run" refers to the technique many victims do not even know they were affected.

[law California will under 18 to make websites delete personal messages

A new California law will under 18 the authority to site Web remove their personal information. It will cover the content generated by the individual adolescent, such as photos, and should enter into force in 2015. However, anything created and published by others will not be included, and companies will not have to remove information from their servers. Some groups have argued that the law could confuse Internet companies and get them to deny access of minors to their sites in order to avoid a legal scandal. Nevertheless, the Common Sense Media charity aimed at protecting children using the web, welcomed this decision as a positive step.

Our HMA! the family continues to grow!

8:51:00 PM Add Comment
Our HMA! the family continues to grow! -

We are very pleased to announce that we have added six additional members of customer support to our team in Belgrade, Serbia bringing the total number of 29 support staff.

our support team to customer is there to answer any questions you may have regarding our service or help with any problems.

We provide a 24/7 customer support outstanding and you can contact us via LiveChat, e-mail or telephone.

live chat

If you wish to speak to a human being "live", then you can with LiveChat. When you visit our Web page, click the "Pro VPN" tab and the "chat with us" box will appear in the bottom right corner of your screen.

LiveChat is available 8:00 to 10:00 p.m. GMT. We are working to 24/7 LiveChat available very soon.

Email

You can always email us with your support issues, and we are aiming for the answer all emails within 24 hours and we work hard to bring this time down. Please email us at :. Info@hidemyass.com

Phone

We recently started offering phone support for customers in the UK, but we will make this for all customers next year. Currently, our phone lines are open Monday - Friday 8:00 to 4:00 p.m. GMT, but you can also leave us a voice message at other times and we will reply by email

TeamViewer .

Sometimes you need that extra help and this is where TeamViewer comes in.

TeamViewer allows us to remotely connect to your computer, observe the problem firsthand and quickly find a solution for you. The process is safe and discreet, and you will be able to observe and control what we do on your computer.

To arrange a session TeamViewer, please visit http://teamviewer.com and download the free software. Once you have downloaded and installed, please provide us your TeamViewer ID and password, and the date and time that we can proceed with the session. We will then connect to your computer and try to solve the problem.

We will always do our best to solve a Teamviewer session at a time that suits you!

BT passes the filter porn "default"

7:50:00 PM Add Comment
BT passes the filter porn "default" -

BT is the third largest ISP in the UK to implement an Internet filter to block pornography. The filter will automatically be set to "on" for all new clients to help parents protect their children online. . Existing customers will be contacted in 2014 and will be asked if they want to implement the service

Customers can choose between three levels of filtering - strict, moderate and light or they can they extinguish. The filter can be connected to a device on the home broadband service, including smartphones, gaming consoles and tablets as well as laptops and desktops.

The filter can be configured to block social networking sites, games, nudity, search engines and other inappropriate sites for children. set to "on" for all new clients to help parents protect their children online. Existing customers will be contacted in 2014 and will be asked if they want to implement the service

Pete Oliver, MD Consumer and Commercial Marketing Digital said :. "BT takes the issue of protecting children online very seriously, and we are very pleased to be able to run the whole house filter to help parents keep their families safe online. It adds to many tools that we have available to our customers. We have focused on the issue of online security since we developed the first world Cleanfeed filter to block child abuse images and fact the technology available to other Internet service providers around the world ten years ago. "

Parents can choose what time the filter is on, allowing children to surf the Internet while day with no chance to access adult sites.

Virgin is the latest UK ISP to implement the new filter, but should announce measures in the new year.

Protecting our children is of course paramount, but there is a more worrying aspect that very few people speak. Leaving the moral aspects filtering one side, BT has not only blocked websites that contain adult content, but the registry said they will also block proxy sites and sites that allow user surf the Web anonymously or bypass censorship. VPNs are gaining ground in their ability to provide not only a safe method of connecting to the Internet, but also free access to the Internet and services that are now denied to users by a major ISP.

We at HMA! believe that you have the right to access the websites you want. We believe that protecting your identity and protect your privacy is of utmost importance. You can use HMA! Pro VPN to unlock the restricted content, encrypt your data traffic, protect your identity and surf the net anonymously.

Say "goodbye" to Windows and "Hello" to Linux

6:49:00 PM Add Comment
Say "goodbye" to Windows and "Hello" to Linux -

Most VPN users works on PCs with Microsoft Windows - which is ok, but from 'not necessarily a security point -of-view the best option. That's why you might want to consider switching to a different operating system, such as Linux.

Not only will you be completely affected by one of the many security holes and vulnerabilities in Windows, you will also use a free system and open-source operating where thousands of experts are constantly working to provide safe and easy way to use your PC -. without relying on Microsoft

If you are not familiar with Linux, you've never used before, and you've been working on Windows for many years, you might consider Linux too technical, too complicated and can only be used for real geeks. However this is not the case anymore

There is only "one" Linux. there are countless so-called "distributions", which differ in many aspects. There are distributions specially designed for multimedia use, distributions specially designed for geeks, for office workers, for the players, for everything. The Web offers help you to make your decision, for example, tests show that the distribution best fits your needs: http://www.zegeniestudios.net/ldc/[1945003~~number=plural]

For beginners, Ubuntu is a good choice. Please note that you must remove your Windows installation when you want to use Linux; you do not even need to install it as a bootable operating system on your device. If you prefer, you can even run Linux from a CD / DVD, without installing a single byte on your hard drive

This means that you can choose from :.

a) Linux installation as a bootable operating system next to Windows (so that you can choose at startup)

+ Pro: Good choice if you plan to use Linux more often than Windows

- Con: Difficult for Linux -newbies

b) Installing Linux as a virtual machine on Windows (so that Linux is basically run like any other Windows application)

+ Pro: You can run Windows and Linux simultaneously

- Con: Not as fast as a real installation, and uses more resources

c) running Linux completely from CD / DVD (so-called "live CD / DVD")

+ Pro: Good to test distributions without the need to install / configure the first

- Con: most changes / customizations are lost the next time

the simplest method is c), which also has the advantage that you can test everything without making any changes to your disk. You just need to download a live CD / DVD, burn and start the

However, if you plan to use Linux and use it regularly, we recommend trying the method b) -. Installing Windows as virtual. Machine

a good tutorial for doing this can be found here: http: //www.psychocats.net/ubuntu/virtualbox

once you install a suitable Linux distribution using your favorite method of installation, you can connect to HMA! Pro VPN using different connection methods. Please refer to the "Linux - Getting Started". Article on our knowledge base for instructions

First it was a block on Twitter, and YouTube now. Hide My Ass! continues to offer free VPN services to help Turkish citizens beat the censorship

5:48:00 PM Add Comment
First it was a block on Twitter, and YouTube now. Hide My Ass! continues to offer free VPN services to help Turkish citizens beat the censorship -

Turkey has blocked two social media sites, Twitter last week and today, YouTube.
We hide my ass! HMA continued support! Users in Turkey currently offering free VPN when the ban.

This new block comes a day after a court ordered the suspension of the ban on Twitter that PM Recep Tayyip Erdogan has supported.

An anonymous audio recording Turkish officials discuss Syria appeared on YouTube seems to have prompted this new movement. The registration relates to possible military operations in Syria, which included Turkish intelligence head talking on the deputy chief of the Turkish army and the Turkish Foreign Minister.

While some users are able to access the site, others are receiving the message (translated) "access has been blocked by the Presidency Telecommunications Communication"

We are proud to support Turkish citizens in their quest for freedom online, and Hide My Ass! extend free services to our Turkish customers while the ban on Twitter and YouTube continues. See below for details on how to claim your free VPN time.
With our service, you can circumvent censorship and access a blocked website like Twitter and YouTube. Once you connect to HMA! with one of your devices (mobile or desktop), you can choose one of our servers located in 65 countries and you will get an IP address that can hide your actual position. Your traffic will be encrypted and you have free and uncensored access to a website that you want while you're practically live in a different country.
We urge all Turkey VPN users to spread the word and help their less knowledgeable friends, co workers and neighbors -the avoid this stupid ban

How to claim - . conditions of this offer

All existing active customers who have HMA! Pro VPN subscription purchased by SMS from a Turkish mobile phone number will automatically have their membership extended.

Other active customers based in Turkey who wish to have an existing extension, should contact HMA! customer support by email with the words "YouTube Ban" in the subject line. Our customer support will check your location by address and card billing details IP credit. If you pay by credit card, we may request further proof of address.

New customers (including inactive users) in Turkey should purchase a subscription of one week per SMS will be automatically extended. You can order via SMS by visiting HMA! order page.

This offer is for a maximum of 6 months from the March 21, 2014, or the end of the ban Twitter Turkish, whichever comes first.

The terms of this offer can be changed any time by Hide My Ass!

What is a host Dynamic DNS and what am I for?

4:47:00 PM Add Comment
What is a host Dynamic DNS and what am I for? -

dynamic DNS hosts are a useful tool for many VPN users, but using it also makes sense without a VPN

most IP addresses are dynamic -. meaning that they change with each connection. This happens with the IP addresses of your ISP assigns you as well as the IP addresses that you are given when connecting to our VPN service.

Of course, you do not manually check before your IP to verify IP site and will know when you are not at your computer, you will not be able to do so, making it impossible to access your computer outdoors.

there are countless reasons why you may want to access your home computer from elsewhere, for example, on vacation or when visiting a friend. Perhaps to listen to music, download files or important documents accessible.

Now, unless you've verified your IP address and wrote down before leaving (assuming it has not already changed since) you will be unable to do so.

is where a dynamic DNS host comes in. It looks like a simple subdomain, such MyPC.no-ip.org and always points to your current IP address, regardless of any change in intellectual property due to connection or use of VPN. It simply allows you to access your home computer using this host name instead of its IP address. Simply connect to it.

The requirements are that you have registered a dynamic DNS host name somewhere and you have set up a dynamic DNS client either on your VPN router or your computer, which keeps updating the host name with your IP every few seconds.

This allows particular sense when using a VPN on a virtual private server (VPS) or a dedicated server when the VPN connection, you must access through the VPN IP instead of IP usual.

  • For more information, links and usage examples see our article on Dynamic DNS

Join Reset Net against NSA spying

3:46:00 PM Add Comment
Join Reset Net against NSA spying -

The campaign, coordinated by the struggle for the future and supported by a number of some of the biggest names in the online world, launched a day of action to fight against online mass surveillance, and establish a free and secure Internet access for all. Reset Net takes place Thursday, June 5, exactly a year after news broke of Edward Snowden revelations about NSA spying on the world, and urging users and developers to use tools and privacy software to protect all world of internet monitoring government.

us to Hide My Ass! full support for this campaign in the fight against government surveillance. We believe in a free and open Internet, one where you should not be concerned to ask whether you are spying. It is therefore important to protect your right to freedom of the internet, and protect your anonymity - and this campaign is a great way to regain your privacy

participants including Imgur. , Mozilla, Boing Boing and about 0 other companies have joined forces to highlight the intrusive behavior of the US government, and defend the rights of the user by adding at least one security feature on their website and mobile applications.

Whether you are an owner of an individual enterprise, large or small, you can be a part of the campaign by adding SSL (Secure Socket Layer), Perfect Forward Secrecy (PFS) and enabling HTTPS, which protects the net government. You can also run the "Reset the Net" start screen, 5 June in support of the campaign, and when you agree to join, you will receive a pack containing privacy software tools that you can download and use.

Tiffiniy Cheng, co-founder of Fight for the Future says "now that we know how mass surveillance, we know how to stop it. That's why people around the world will work together to use encryption everywhere and make it too difficult for any government to lead the mass surveillance.There are moments in history where people and organizations should choose to stand on the side of freedom or tyranny. on June 5, the Internet will show which side it is on. "

another way to protect and secure your data is to use a VPN (HMA! Pro VPN, of course!) a VPN is an excellent tool you use to encrypt your data on your mobile phone, or laptop (at work and at home and on the road). A VPN encrypts all data you send and receive an encrypted tunnel, so that any third party that attempts to steal your information is thwarted. More and more people are using VPN as a way to prevent governments and other third parties to snoop into their personal and private information.

Clear the Net begins June 5th midnight ET, so make sure you are ready to take back your privacy!

For more information on HMA! Pro VPN here

Russia: Farewell to a free and open internet

2:45:00 PM Add Comment
Russia: Farewell to a free and open internet -

Many countries, such as Iran and China, control what its citizens can access and say on the Internet, and Russia now? is heading in the same direction.

in the last month, the Russian government has worked to tighten online censorship, justifying his actions by saying it will help eliminate anti-terrorist groups and websites promoting activity illegal.

Russia is vying for a greater control over what its users can say, and adopted several laws that give their all. Earlier this year, the power to block websites considered a threat to the reputation and political interests of Russia, and websites promoting illegal activities was given to the communications regulator of Russia Roskomnadzor. What is interesting is that Roskomnadzor can bring any web site down, without a court order and have already done repeatedly, closing several opposition blogs, including chess master and political activist Garry Kasparov and a number of news channels. The blocks on both sites have since been lifted.

A law passed earlier this year and the entry into force on 1 August 2014, forcing foreign companies to move their servers in Russia to handle traffic Russian, and store data for six months. But for many Internet companies like Google and social media companies like Facebook and Twitter to execute this move would be a logistical nightmare, and the cost would be enormous. According to Karen Kazaryan, an analyst with the Russian Association of Electronic Communications, it will cost about $ 0 million to build servers and $ 10 million per year to maintain them.

This means that the communications regulator, Roskomnadzor would be able to monitor and control what its citizens are saying online - of course, this also means that the Russians would think twice display their thoughts on Facebook, Twitter, forums and other social media. Self-censorship is naturally in place, and that is something Putin applaud. It remains to be seen whether foreign companies will house servers in Russia, and if not, Russia will not permit its citizens to access popular sites such as Facebook, Twitter and Google? Time will tell us.

Law Bloggers

Russia passed another law, called "Bloggers law" which also takes effect on 1 August This law means that all bloggers will be treated as a media and any blogger with over 3,000 page visits, including Twitter users with more than 3,000 followers, will have to register with the authorities. Interestingly, the equivalent law of China has a 5000 page view limit. According to Bloomberg Businessweek this means that companies like Twitter will keep the details when a user logs on and off, and to whom they send their messages. In addition, bloggers will have to publish their real name and contact details on their website. If they fail to comply with these rules, they face a hefty fine. . Human Rights Watch said "between 10 and 30 thousand rubles (US $ 280-840) for individuals and up to 300,000 rubles ($ 8,400) for legal entities Repeated violations incur higher fines - up to 50,000 rubles for individuals ($ 1,400) and up to 500,000 rubles ($ 14,000) for legal entities -. or administrative suspension of the site up to a month "

Recent talks were held between Twitter and Roskomnadzor. the result was a bit confused, with Russia saying that Twitter had agreed to block ten extremists and Twitter accounts refute this assertion. in the past, Putin called Twitter "a CIA project" and he is apparently also concerned that Russian companies will suffer in the hands of foreign companies operating in the country.

From what I can see, there is more than a matter of control and place a hold on a free and open internet - something we at HMA! not to applaud.

There is a solution!

Artyom Kozlyuk Internet watchdog Freedom independent Rublacklist.net recently told The Moscow Times "People are waking up to the fact that the government is hamfistedly regulates the Internet, and are more increasingly looking for tools to regain access to information. "

and these tools are VPN (virtual private networks). Many countries whose governments block websites such as YouTube, Facebook and Twitter go round these restrictions by using a VPN.

You do not need to be a technical genius to understand what a VPN is and how to use one. Millions of people around the world, from all walks of life use in a number of ways; to bypass the geo-restricted content, access their pages government blocked to secure their data when Wi-Fi use and keep their online research, private.

When you connect to a VPN server, you are given a new IP address, allowing you to surf the net knowing your government can not spy on your online activity. Internet users from countries like China and Iran and Russia use a VPN to do just that.

We at HMA! believe that everyone has the right to express themselves and a free and open Internet is so important in the world we live in today. Taking this fundamental human right is something that we hate and actively seek to enforce.

Where there is government censorship, there is always HMA! Pro VPN And now our Summer Sale is on -.! Save a huge 56% on a 12-month subscription

For more information on HMA! Pro VPN here

The Pussycat Riot

1:44:00 PM Add Comment
The Pussycat Riot -

At HMA! we applaud the cats who embrace an open Internet, and freedom of expression. We take our hat to cats who stand against internet censorship and oppression, which is why we are very proud to announce our "Cats-against cyber-censorship" movement The Pussycat Riot .

Yes, absolutely! We call them cats everywhere, cats whose owners live in free countries of Internet censorship to stand together, paw in paw, to fight against the most famous tyrants of the Internet.

How to participate

You can help spread the word by posting cat videos and images to rise against cyber censorship, using #ThePussycatRiot and join chat heavyweight internet support the Pussycat Riots, including Nala_Cat; squint Jarvis P. Weasely; philosophical Henry Black cat; developed the famous villain and Princess Monster Truck

products satirical We also created for the movement, including Vladimir Putin and Kim Jong-a scratching cat -. Show me a cat who would not want one of them. There are also cats litter boxes emblazoned with the faces of dictators internets most popular Internet, including Kim Jong-un North Korea Recep Tayyip Erdogan and Abdel Fattah El Sisi Egypt. You can order these on the website of the campaign www.thepussycatriot.org and all proceeds will go directly to the charity Index on Censorship . So who will be your moggy choose to show their contempt?

If your government denies you the right to access to sites such as Facebook, Twitter and YouTube, now is the time to sharpen your claws Purrrrfect and stand up against Internet censorship and website ridiculous blocks . Why should you be denied access to the Keyboard Cat and Kitty Surprised?

Mark your territory and participate in the campaign today and help to challenge the powers that limit millions of world citizens accessing information that they have a human right.

Beware of Internet dictators, kitties' A claws!

You can learn more about the campaign here www.thepussycatriot.org and on Instagram and Twitter.

New HMA! VPN Mac OS and Windows software Pro

12:43:00 PM Add Comment
New HMA! VPN Mac OS and Windows software Pro -

software update Mac OS X

We are very pleased to announce the launch of the new Hide My ass! VPN Pro for Mac OS X v2.1 - thank you for all your comments, which made this release possible

Improvements:

  • 1-click installer.
  • upgrade design
  • improved stability

Go to the latest version here.

Windows software update

We also worked on the Windows software v2.8.11 is now available. Click here to access the latest version, which has a new look!

We always want to hear from you, so let us know what you think about the new versions.

Tim Berners-Lee warns against the threat to the internet

11:42:00 AM Add Comment
Tim Berners-Lee warns against the threat to the internet -

Governments and large companies have something in common; they control the Internet by blocking a number of Web pages, snoop on our online activities and censoring the information we have a right to access.

We have the right to privacy, freedom of expression and communication, but unfortunately, many large companies and governments consider it their right to be able to spy on us, and decide what is the information that we can and can not access.

British computer scientist Tim Berners-Lee, who invented the World Web Web 25 years ago, is fighting corporate firms and government control Of the band. At the recent Web festival we held in London, Berners-Lee pushed his message that the Internet is under threat.

"If a company can control your Internet access if they can control what sites they go to, and they have a huge control over your life. If a government can block you, for example, the political pages of the opposition, then they can give you a blinkered view of reality to remain in power.

Berners-Lee called a digital "Magna Carta" to ensure user privacy, rights and freedoms, saying "there were many times he was abused, so now the Magna Carta is to say ... I want a web where I am not spied, where there is no censorship. "

More dates have been added, the next event will take 28th place - 30 November. For more information on the Web we want, please visit their website.

Since secret documents about the NSA were leaked by Edward Snowdon, we are more aware than ever that governments spying and tracking our online business, and more and more people turn to VPNs to provide privacy and online security. When you use a VPN, your data is encrypted by sending it through a private VPN tunnel thwart the efforts of the government or other third party to be able monitor what you get up to online.

Use a VPN to protect your privacy online!

HMA! Pro VPN we make it easy for you to change your IP address, so you can surf the Internet away from prying eyes. Once you have purchased a subscription and you download our free software for your PC, Mac, iPhone or Android, simply connect to one of our servers, and within minutes you'll be surfing the net with confidence no government agency, pirate or third party may spy on your online activities.

Internet users living in Iran, Turkey, China and Russia to use VPN to get around government blocks placed on a number of websites, including Twitter, Instagram, Facebook and Twitter their for expressing their opinions, and communicate freely with the outside and the bypass website blocks. And with HMA! Pro VPN, you can too!

Our own campaign Pussycat Riot is against censorship on the Internet and you can show your disdain for dictators of the internet as Kim Jong-Un and Putin publishing cat videos and pictures using #ThePussyCatRiot on Twitter and Instagram. Of course, dogs, guinea pigs, hamsters, donkeys are also welcome, so get snapping and support our campaign against cyber censorship. In addition, you can purchase various goodies, including litter trays for cats and cat scratching posts with the faces of some of the internets most popular Internet dictators, including Abdel Fattah el-Sisi. All proceeds will go to charity Index on Censorship

At HMA! we believe that everyone has the right to speak, we deplore government censorship which is why this company started, and we believe that a free and open Internet is paramount important in the world we live today.

For more information on our campaign against cyber censorship visit The Pussy Cat Riot

The harvest of our data using the voiceprint technology

10:41:00 PM Add Comment
The harvest of our data using the voiceprint technology -

If it were not enough that so many corporations and governments monitor and track our online business, now they use a tool for expanding their capacity for monitoring and collecting data, using voiceprint technology.

according to a study by the Associated Press, 65 million voice prints have been collected and stored on corporate databases and Government, including the US and Europe and Turkey's 10 million people voice prints have been stored. We find that astounding.

The people are quite understandably concerned that their privacy is seriously compromised. Voiceprint the harvest is another invasive way of collecting data, watching our movements, and monitoring our communications. Big brother is watching, even more than we realize!

Large companies, of course, are in favor of the voiceprint technology. Being able to recognize consumers by their voiceprint, as they move from store to store is huge money for them because they can see what products and services people are interested and where they spend their money. Thus, they not only do they encourage money with coupons or chocolate in exchange for our data, they can simply take our voiceprint! A win-win situation for them. Whoopee do!

Other proponents of the technology, are banks, including JPMorgan Chase & Co and Wells Fargo & Co who used the voiceprint to fight against fraud and identity theft which, although course, is a good thing. But Tech and privacy lawyer David Klein feels "there should be regulations on both the state and federal governing practices regarding the collection, use and sharing of that data so that we do not go further into the world of George Orwell. "

large banks, including US Bancorp and Barclays PLC are considering introducing voiceprint technology in the near future. Iain Hanlon, an executive of Barclays said: "The general feeling is that voice biometrics will be the de facto standard in the next two or three years," Scary

surveillance experts

Digital and groups.! of privacy are concerned how quickly this technology is growing. Lee Tien of the Electronic Frontier Foundation (EFF) said that the technology could be used to find the location of a natural person, although " it was not designed for listening or tracking people, it could still identify them and associate them to a location ".

Unfortunately, the voiceprint technology is another way that governments and businesses can collect our data, and expand their snooping capabilities.

Every breath you take
Every move you make ...
I'll be watching you! - The Police

HMA! Community feedback for Windows is now LIVE!

9:40:00 PM Add Comment
HMA! Community feedback for Windows is now LIVE! -

We are very pleased to release the latest version of Hide My Ass! V2.8.19.0 VPN client (for Windows.)

Our Community Feedback for Windows is now live, and we invite you to leave your suggestions and comments about our client software. If there is something you would like to see, or something that you think is missing - we know

Note : HMA! Pro VPN users must be connected to their account to post comments and leave suggestions

How to download :. Login to your Control Panel VPN, click Software and Support and download the software.

Thank you!

HMA! Team

Twitter is now spy on other applications that you download to your phone!

8:39:00 PM Add Comment
Twitter is now spy on other applications that you download to your phone! -

Twitter were concerned about their decline user base who are thinking about how they can attract new users, encourage inactive users back and of course, generate more money -. which let's face it, is the main reason behind this great new idea

Therefore, it is the boffins at Twitter decided to do? Well, they decided they poke their curious noses in your Android and iOS smartphones so they can see the other applications you've downloaded. Twitter called the data they collect from you, the "Graphic app" that helps to "build a more personalized experience for you on Twitter." By monitoring the applications installed on your device, they will be able to content that they hope to be directing of interest to you, and suggest "who to follow" people with similar interests, or users who have the same apps you.

of course, this also includes improving ad targeting will be stolen leads to your diet; tailor made ads based on the games you play, your tastes, the applications you have, people you follow, and your interaction with other tweets.

Keen to gather new users under their wings, new "snapshot Twitter timeline" feature will be less intimidating for new users, showing them interesting content before they started to Twitter or follow other Tweeters.

those beaked recently stated that "we collect the list of applications you have Installed. We do not collect data within applications. "How refreshing to hear that they are honest and frank they make money from us!

But it is still quite scary, and you can have applications that you prefer others people not know.

good news because you can withdraw!

If you have not already turned on "limit ad tracking" on iOS or chose to "opt out of ads based on interests" on Android, the good news is that you can always turn it off, if you wish.

Android

      1. Once you are logged in to your Twitter account, tap the overflow icon

2. Tap Settings

3. Press the handle you want to adjust, for example, @nicolaHMA

4. scroll down the list until you reach the section Other and here will " Tailor Twitter based on my applications ." Uncheck this box

iOS

  1. 1. Once you are in the Twitter app, go to Me tab and tap the gear icon
  2. 2. tap Settings
  3. 3. tap the account you want to set an example @hidemyass!
  4. 4. Under Privacy, you will see " Tailor Twitter based on my applications ." Uncheck this box

Many of us download applications that we rarely use, so that Twitter could potentially gather a ton of useless information, and if you use a VPN, which changes your IP address, you also inhibits their ability to collect accurate statistics that will not put a smile on their face or the advertisers!

What do you think of the new idea of ​​Twitter?

How to use Private Browsing, and hide clear on Safari (iOS / iPhone / iPad, iTouch)

7:38:00 PM Add Comment
How to use Private Browsing, and hide clear on Safari (iOS / iPhone / iPad, iTouch) -

We recently showed how to activate the incognito mode, clear cache, and disable location services on Safari (Mac OS), Google Chrome, Internet Explorer and Firefox

Fortunately all browsers include features that allow you to:

- Surf the net without leaving traces on your. computer (using "private browsing" or "incognito")
- Clear cached files (cookies, temporary data, images, web sites)
- tracking / location services Disable (to prevent sites Web to know your position)

This tutorial shows how you can browse privately on your iOS device, such as your iPhone, iPad and iTouch, and how to clear your browsing data machine cached.

1. Settings
Tap the Settings icon (the gear) as shown in the image below

a13.png

2. Safari
Tap " Safari "to access Safari settings

a14.png

3. private browsing
Press" OFF "button next to" private browsing "to activate.

a15.jpg

4. To clear all cache types, cookies and other browsing data, follow these steps :.

Clear history, cookies, and browsing data using the buttons highlighted in red on the screenshot below

a16.png

And that's all ! Simple.

You can find more tips and tricks in our Help Center and also in our forum. Or if you prefer, you can always send us an email.

Google Miamians ask "What is VPN?"

6:37:00 PM Add Comment
Google Miamians ask "What is VPN?" -

"What VPN" was searched by Miamians 14th annual year of Google in search. So we explained that is a VPN and why you should seriously consider using

what will Google searches in 2015, is a puzzle (but if you are not more like dancing twerk!) what we know is that the desired people for 2014 in the 14th annual Year of Google in the search, and what we at HMA! found particularly interesting is that our friends in Miami sought.

Yes, you guessed it, the residents of the magical city, were curious to know "what VPN" - so we HMA! are only too happy to explain what a VPN, and why you should consider using.

Moreover, tops the list "which is" the search was ALS, also known as the disease of Lou Gehrig. To learn more about what Miamians sought, including the Top trend "what is" and also Top trends' how to 'in 2014 -'! How to flirt yes, Miamians wanted to really know

What is a VPN?

VPN stands for virtual private network. This is a secure Internet connection between your ISP and our ISP. When you use a VPN ALL for your online business is "encrypted", therefore, anyone who tries to break into your Internet connection to steal private and confidential information (eg on Wi networks -Fi public) will not be able to because your Internet traffic is well hidden behind the VPN.

many companies (corporate companies and smaller) and organizations and individuals use a VPN to keep their data confidential on the hands of hackers, thieves and other third parties.

When connected to one of our Pro VPN servers all data is sent through an encrypted VPN tunnel, keeping safety and safe from prying eyes. All the websites you visit, username and password you use to login to websites, people you communicate with online, and the files you download and action will be out of sight.

, your online identity

Not only your online traffic-identified as an "IP address" is also hidden. Your IP address is essentially your "online footprint" and identification with the world online. Your IP address can tell people and websites that your physical location and which ISP you use.

Ways you can use a VPN

Since Edward Snowden NSA revelations were leaked, more and more people are turning to VPNs to ensure that not only governments but also hackers and thieves are stopped in their tracks to be able to spy on their online activities, steal their identity, their passwords and user names and other valuable personal data

Expats or those who travel abroad regularly use a VPN to watch their favorite shows at home, but there are a number of other ways you can use a VPN

-. . Keep your personal and confidential data safe from third parties during the Wi-Fi use Read our article on "the dangers of Wi-Fi public use" for more
. - Bypass blocks placed government on your favorite websites like Facebook, YouTube, Twitter and Google
- Browsing the Internet with confidence that whatever the online activity of your Perform is anonymized
- When you use a VPN (! HMA Pro VPN), hackers and thieves can not trace your real IP address, because you'll use one of our IP addresses, thus thwarting any attempt they make to discover who you are and where you are
- Use a VPN to get better speeds when streaming content online
- a VPN can potentially improve and protect your gaming experience
- VPN is your key to access the video of all countries

You can also use a VPN to save money on flights

You can use HMA! Pro VPN on Mac, PC, iPhone and iPad and Android. For more information about HMA! Pro VPN visit our website, or if you prefer, send us an email and one of our support donkeys will be more than happy to answer any questions you may have.

VPN server in Cyprus and 14 other servers added

5:36:00 PM 5 Comments
VPN server in Cyprus and 14 other servers added -

VPN server in Cyprus! We are proud to offer our customers 779 servers in 151 countries and more than 103,000 IP addresses HMA! server network.

We hide my ass! always love to hear from you, thank you for all your suggestions server. We received a number of requests for more VPN servers in France, so what we did? We added another VPN server in Greece! Hoorah! Just teasing - we also added multiple VPN servers in France

Since our last update, we added 6 NEW PLACES with 15 servers and 1,796 IP addresses HMA! Pro VPN network. ! Yep, we do not lose time

Here are the details:

  • Netherlands, Amsterdam - Virtual USA VPN (Location 1 Servers 9-10) (249 IPs) (Virtual Place - expanded location)
  • Switzerland, Jona VPN (slot 1 Servers 1-2) (249 IPs) (new location)
  • States STATES, California, Los Angeles (VPN Servers 22-24 location 1) (372 IPs)
  • Greece, Patras VPN (IP 64) (new location)
  • in France, Toulouse VPN (Location Servers 1-2) (244 IP) (new location)
  • United States, Alaska, Anchorage VPN (location server 2) (124 IPs)
  • Cyprus, Nicosia VPN (122 IPs) (new location)
  • Netherlands, Spijkenisse VPN (124 IPs) (new location)
  • Netherlands, the Hague VPN (location 1 servers 1-2) 248 IPs (new location)

We work hard to add even MORE VPN to our network servers, so if a country or location that you want a VPN server, please let us know by commenting here or on our blog you prefer, you can contact our support on donkeys LiveChat (look for the "chat with us! "Box in the corner at the bottom right on our site) or you always send us an email!

we are delighted to say that we now have VPN servers in each State of the United States - take a look at our list of USA VPN servers

.