Players are a key target for cybercriminals

10:04:00 PM 2 Comments
Players are a key target for cybercriminals -

Cybercriminals are becoming avid start targeting players to steal their data from their game accounts and those of their virtual objects whose value can reach thousands of dollars for some of them.

gamers

global growth identified cyber attacks Kaspersky announced targeting. Between January and June 2013, are well over two million attacks against players around the world that have been identified, representing almost 11,500 attacks per day, while the number reached 7,000 in 2012.

Kaspersky Lab has identified 10 European countries that are most affected by the attack attempts in the first half of 2013: Spain comes first with 94,700 annual attacks, followed by Poland (85,000), followed by Italy (52 0). France is fourth with 29,300 targeted attacks. Then comes Germany (18 300 attacks), Ukraine, Greece, Romania, Portugal and Serbia.

Players are indeed lucrative targets for cyber criminals. "The increasing use real money to buy virtual items can increase their yields," says Nicolas Burn, Senior Malware Researcher at Kaspersky Lab. "Phishing is also very present and is suitable for video game codes."

to prevent your computer or mobile device to be in danger, use a VPN service now. you must ensure that your online business, your p2p activities and downloads arrive safely.

your internet connection is encrypted with a level top secret that protects you against hackers and illegal ears trying to listen or obtain sensitive information about you. also, your IP address is automatically replaced by an anonymous IP address country you have selected

Finally, your computer is hidden behind the VPN many servers :. When connected to the VPN, no one can access your computer without passing through the protected VPN servers.

VPN Installation is simple and does not take more than 2 minutes. Buy a VPN service or test our VPN offers free now.

Yahoo! closed in China

9:03:00 PM Add Comment
Yahoo! closed in China -

Yahoo China , which was operated by Alibaba Group, e-commerce and Chinese Internet services, has just closed its Web portal.

farewell message posted on the website redirects visitors indeed now.taobao.com and explained that the decision to close the portal Yahoo China is in line with the agreement concluded in 2012 between Alibaba Group and Yahoo !.

gate closure of Yahoo China comes two weeks after Yahoo's email service in China stop, with users invited to transfer their accounts to Alimail Alibaba. In January, Yahoo China ceased Chinese music service, explaining that the company adapts its product strategy.

Indeed, in 05, Yahoo paid $ 1 billion for a 40% stake in Alibaba, before the company became one of the key assets of China's booming e-commerce market. Then, in 2012, the agreement between Yahoo and Alibaba Group refers later to go on the Functioning of the brand Yahoo China for up to four years. The decision of the Alibaba group gradually stop operating its brand Yahoo properties is an example of the difficulties faced by major American Internet companies like Google, eBay and Amazon China. This can be explained by the large government censorship, but also by the inability to efficiently locate and kick some Chinese companies such as Baidu and Tencent.

Yahoo still holds a 24% stake in the Chinese company, which should make public by 2015 and is estimated at about $ 14 billion.

As a Chinese resident, if you want to avoid Internet censorship and access is at your Yahoo services, go to VPN, a service that allows you to choose your country connection. You can base your IP address to be located in one of the 100+ countries where access is not limited and will thus access to the sites of your choice completely anonymous. You can access blocked sites and protect your Internet activity with a secure VPN tunnel including a virtual military encryption. Installing VPN is simple and does not take more than 2 minutes, then do not hesitate.

VPN for China

Customers want to cover their online movements

8:02:00 PM Add Comment
Customers want to cover their online movements -

according to a new US study, more and more users would like to be anonymous online, but still think it is impossible to avoid observation by specific people or organizations.

In a survey of 792 US Internet users, 86% said they have taken specific steps to remove or mask their fingerprints :. namely delete cookies, encryption of email, avoiding use their real names online or hide their IP address

The survey was conducted by the Pew Internet Project Research Center, and subscribed by Carnegie Mellon University. He explained that 59% of Web users surveyed do not believe that it is possible to be totally anonymous online, and 68% of Internet users believe current laws are not good enough to protect the privacy of people online.

This is not due to a lack of awareness, as most Internet users know - according to Pew - that some of their personal information - such as photos, videos, addresses e- email, birth dates, phone numbers, home addresses are available online.

A growing number of Internet users say they are concerned about the amount of personal information about them that is online, a figure that has increased from 33% in 09 to 50% in 2013 .

people do not really know how to take control of their information and to ensure that the content of their emails, the people to whom they send e-mails, where they are when they are surfing online, and content of files they download are not accessible to prying eyes.

recent PRISMgate and other revelations of Internet surveillance has made people more willing to protect their personal data without knowing where to start in order to be sure they remain anonymous online.

"Their concerns apply to any one monitoring ecosystem. In fact, they are planning to try to hide their personal information against hackers, advertisers, friends and members of the family they try to avoid observation by the government. "Lee said Rainie, project director of the Pew Research Center Internet has also contributed. report

the section of the survey watching various issues related to security revealed why this desire has recently developed problems that many Internet users have already experienced: 21% had an email account or social network compromised or used without permission, 12% were stalked or harassed online. Last but not least, 11% had stolen important personal information such as credit card or bank account, and 6% had an online scam and lost money due of cybercrime.

Be careful about the data you leave on the Internet, free downloads and free services may mean that you are actually the product. The best way to protect yourself is to use a VPN in order to encrypt all communications and Internet data transfer. Thus, no one can analyze your browsing information and can not offer you ads based on your personal data. In addition, targeted advertising also uses geolocation to increase efficiency. With a VPN, you can easily change your IP address by selecting a host country between several servers worldwide. The VPN allows you to hide both your personal and your country. Your connection is made anonymous and reliable, and you can stay for free on the Internet, away from prying eyes.

bringing together millions of email contact lists NSA

7:01:00 PM Add Comment
bringing together millions of email contact lists NSA -

the famous NSA - that the US intelligence agency - hundreds gathered million digital lists of American contacts through their e-mails or instant messaging services as revealed by the Washington post, referring to documents leaked by Edward Snowden, the former NSA consultant.

For example, during a single day in 2012, the NSA said it had intercepted more than 444.743 contacts lists from Yahoo !, email accounts 82,857 Facebook accounts, 33 697 from Gmail accounts, and 22,881 from various other ISPs in a statement published by the Washington post.

These data represent a typical day of data collection. When these figures are extrapolated over a year, it reached an enormous number of 250 million e-mail address books lists. This would imply that several million Americans have been spied on and get their personal data collected by the government, without them being aware.

These data are very high, since in these e-mail databases, there are also phone numbers, physical addresses, economic information and family, and in some cases, raw lines of a message.

NSA intercepts these lists "on the move" when they are in the Internet exchanges, rather than "resting" in the server computers. And because of this, the NSA does not need to inform Internet groups that contain this information, such as Yahoo !, Google or Facebook.

To circumvent the law which prohibits the collection of data on American citizens on US territory, the NSA intercepts data from different access points "in the world" but not to the States United, said intelligence officials.

during the summer because of the scandal triggered by information Edward Snowden, President Obama promised US review the monitoring programs on the telephone and digital data. Meanwhile, Russia gave Edward Snowden asylum for a year, but the US wants it to be extradited to face charges of espionage and organized leak information about the NSA surveillance program the United States and abroad.

To protect your personal data, select a VPN service: the VPN encrypts your Internet connection and keep private the sites you visit and the information you provide on those sites. Any information you send will go directly into your secure virtual tunnel, including a Russian VPN server. With the service VPN, you can easily direct your traffic from one of 20 available countries. Your computer and your mobile or tablet to connect to the Internet from one of 20 available countries and no one can intercept your online business. Choose the service VPN to surf the Internet safely and anonymously, where you connect to the Internet from.

The cost of cybercrime is in full swing

6:00:00 PM Add Comment
The cost of cybercrime is in full swing -

According to HP, the cost of cybercrime has increased by 78% in four years and in the same time to respond to the attacks has more than doubled. In addition, the attacks become more frequent.

Developed by the Ponemon Institute for HP, the 2013 cost of the study on cybercrime shows that cybercrime has reached US $ 11.56 million cost for a representative sample of US companies, an increase 78% compared to HP first study four years ago. This study also found that the time required to neutralize a cyberattack increased by nearly 130% over the same period, the average cost incurred to address a single attack has reached a million.

Cyber ​​attacks are increasingly sophisticated cybercriminals are increasingly specialized and share information to obtain confidential data and interrupt critical business functions.

the average annual cost of cybercrime by company reached US $ 11.56 million, the range is between 1.3 and 58 million. This represents an increase of 26% or $ 2.6 million, compared with the average cost reported in 2012.

Businesses face on average 122 successful attacks per week, t.v. 102 in 2012.

The time to resolve a cyberattack is 32 days, with an average cost associated with the attack is US $ 1,035,769 or US $ 32,469 per day on average, which means an increase of 55 % over last year -. 591.780 dollars for a time to solve the attacks of 24 days on average

the most costly cybercrime activities are those related to malware and denial of service. The theft of information continues to be the highest external cost, followed by disturbances. On an annual basis, account information loss for 43% of total external costs, and is down 2% compared to 2012. business interruption or loss of productivity accounts for 36% of external costs, is up 18% from 2012.

If the cost of cybercrime differs depending on company size, small structures show a much higher cost than the large groups of employees
the cost of cybercrime is significantly higher in the following areas :. financial services, defense, energy and public services in retail, hospitality and consumer products.

HP with this study of US companies, the Ponemon Institute conducted specialized studies in Australia, Germany, Japan and the UK for the second consecutive year. A survey of French companies was conducted for the first time this year. Among the countries studied, American companies have shown the greatest impact in terms of cybercrime, with an average total cost of $ 11.6 million, the cost of up to $ 5,10,000 for French companies appear.
The latest report found that Norton 2013 every second, 12 people surfing the Internet in the world become victims of malicious acts online. This is actually more than 1 million people every day. During one year, 378 million adults worldwide are victims of cybercrime.

To avoid becoming a target for cyber criminals, use a VPN service when surfing the Internet and that, regardless of where you are: all your internet activities are anonymous and protected by a military complex coding type using VPN and PPTP VPN open. In addition, through the virtual VPN tunnel that you establish your secure VPN connection appears as a connection from your chosen country, you will change and hide your IP address. This is true if you connect from your computer, your mobile phone or tablet. And you can use the free Wi-Fi networks without your computer by taking the risk that your traffic is intercepted.

Installing a VPN today, or follow us on the blog VPN and social networks to take advantage of some free VPN offers.

McAfee assessment of cybercrime in Q3 2013

4:59:00 PM Add Comment
McAfee assessment of cybercrime in Q3 2013 -

McAfee has unveiled its latest analysis of the key trends of cybercrime in the third quarter of 2013 :. it shows that cybercriminals are not many holidays this summer

"during the summer, we added 20 million new samples in the" zoo "McAfee, which now includes a total of 170 million elements. "We also found four major trends that require both individuals and businesses to be cautious about how they protect their data," said Francois Paget, one of McAfee Labs researchers . This includes an increase in attacks on Android devices 30%, growth of "signed" malware, spam increased (+ 125%) and increased use of virtual currencies.
about the increasing attacks on Android, McAfee researchers have identified a new family of malware (Exploit / MasterKey.A) that allows a cyberpirate go beyond verifying the digital signature corrupt applications. They also identified a new type of malware that, once installed, downloads a second layer, without the user's knowledge.

"Signed" malware also increased by 50% compared to the third quarter. This concerns the validity of most digital certificates that are currently underway. They also raise questions about how businesses and individuals can now distinguish the valid certificates of those corrupt. This trend is even stronger mobile, growing from zero to almost 25% of Android malware samples recorded during the last three years.

Regarding the increase in spam (+ 125%), it was boosted in September allegedly due to "snowshoe spammers" or affiliate marketing practices, which seeks to legitimize vis-mark -vis its consumers.
Finally, virtual currencies, a market estimated in 2012 by Yankee Group to nearly $ 47.5 billion, it still draws more pirates. These virtual currencies (or bitcoins) suffer no regulation or control and represent an unprecedented opportunity for money laundering. They are also stimulated by the development of parallel Internet markets, including counterfeit drugs, arms sales, drug buy, etc ... And although the best known of these sites, called Silk Road, was closed on October 1st, these illegal markets persist and they seem to dry up soon.

to avoid becoming a victim of cyber criminals use a VPN in order to encrypt all communication and data transfer over the Internet, if you use a PC, mobile phone or tablet. Thus, no one can analyze your browsing information and send you malware. With a VPN, you can easily change your IP address by selecting a host country between several servers worldwide. The VPN allows you to hide both your personal and your country. Your connection is made anonymous and reliable, and you can surf safely on the Internet, away from prying eyes.

NSA also monitor online games

3:58:00 PM Add Comment
NSA also monitor online games -

according to a new paper published by Edward Snowden, the former NSA agent, and published on the website ProPublica, online games like World of Warcraft and Second Life are monitored since 08 by the American and British intelligence services .

According to the document, terrorist and criminal organizations are using online games to communicate without being known, transfer money or planning attacks. Thus, the spies would have created their own characters to infiltrate the field of online games and possible witnesses suspects exchanges.

However, according to the Guardian and the New York Times, which analyzed all the documents, the secret services have placed as many agents on the case where a group of "confliction" (this term refers to military effort in place to prevent interference or collisions between professionals in the same camp) had to be created.

Moreover, the company behind World of Warcraft revealed that neither the NSA nor his British counterpart (Government Communications Headquarters) had requested permission to gather information about the players through their game. These agencies all approaches create more problems than the activities of US citizens can not be controlled unless justice prior approval. Moreover, according to former intelligence officers and employees of these video game companies, there is no evidence that terrorist groups do use these platforms to communicate with online play.

The best way to limit the traces you leave on the Internet is to use a VPN service. A VPN reduces your online movements by replacing your routing information: your IP address will be replaced by an anonymous IP address. Our secure DNS servers keep secret requests that you make, so that no one can take a look at your browsing history. Your Internet connection is encrypted with a secret top-level system that protects you against hackers and ears trying to listen or obtain sensitive information about you. Your computer is hidden behind the many VPN servers :. When connected to the VPN, no one can access your computer without passing through the protected VPN servers

How NSA elite team works

2:57:00 PM Add Comment
How NSA elite team works -

Sneak in the TAO, the elite division of the NSA with equipment similar to that of James Bond!

So far, the NSA had led to many new media with the case of PRISM, a scandal involving major players in the Internet, through its massive data espionage . online people "suspected of being dangerous" But the NSA has much more sophisticated means, when he aims to collect targeted information: access to customized operations (CAT) is a team of elite hackers specialize in data theft, revealed by the German magazine Der Spiegel.

the elite unit would be collected "some of the most relevant information that our country has ever seen," according to comments . anonymously by one of the leaders of this elite team for information, TAO uses various means: a kind of James Bond arsenal of sophisticated spy equipment to targeted interception equipment material to slip special software

Among the high-tech gadgets, the TAO would be. and exploited some USB keys containing radio transmitters to compile data in transit to them, but also the computer screen cables that can record everything that happens on the screen. And that material power is coupled with detailed knowledge of the Internet and all kinds of software. All defects (Internet, architecture of the weaknesses of common software ...) are operated to spread spyware. The German newspaper said that the resumption of Windows error reports to Microsoft may be through the NSA in order that it can optimize its operations spyware.

Last but not least, the CAT can also intercept the material ... If any of the NSA "targets" to place an order to buy electronic equipment (computer or other things), the package may pass through the hands of the TAO expert before reaching the customer. With support from the FBI and / or CIA, the elite team creates a check on deliveries. After a stint at TAO, the material contains the software required for the user to be spied closely. According to documents recovered by Der Spiegel, this method would be "much more productive."

This information is added to the sum of revelations that leaked into illegal methods of the NSA. American documentary filmmaker Laura Poitras, which is close to Edward Snowden, also contributed to this article in Der Spiegel.

The best way to ensure that your personal data is not followed is to use a VPN service. The reduced VPN your online movements by replacing your routing information by anonymous IP address. Secure DNS servers VPN keep secret requests that you make, so that nobody can see your browsing history. in addition, your Internet connection is encrypted with a very robust system that protects you against hackers and illegal ears trying to listen and obtain sensitive information about you. Your Internet connection is hidden behind many servers VPN :. When connected to the VPN, no one can access your computer or mobile device without using VPN protected servers

Crime: between the internet and reality

1:56:00 PM Add Comment
Crime: between the internet and reality -

cybercrime is gaining ground in the real world with the same approaches used by cybercriminals and traditional criminals. We also note that more and more cases of crime involving the use of digital media, "said the French security information Club (CLUSIF) in its 2013 Panorama.

According to Eric Freyssinet, Head of Division of the fight against cybercrime in the French National Police, one can speak of "the internationalization of organized crime with links between the two worlds. And France is highly targeted by these criminals: there were only French trade data on some servers found by the security company Symantec "

He also cited a criminal group" apparently based in Israel " which involves cybercriminals "apparently. based in Ukraine to collect targeted positions IT business information for passwords, credit card numbers while money transfers took place. "

CLUSIF noted that 2013 saw many cybercriminals arrests, particularly related to the group Anonymous, "but they have not disappeared shots to stop these activities are temporary and closed services reopened in a very short period of time." commented the report

"the methods used by the group were taken and improved by some circles of criminals," said the CLUSIF. in 2013 was the "year of decomposition" of this system Anonymous, "the movement has become a victim of its own success and opportunists have used the movement as a screen to demand "their actions and" echo motion codes, "explains Fabien Cozic, the consultant for cybercrime Lexsi society.

the Anonymous group is also an international movement to fight for online freedom. It aims to both private companies such as Sony government systems, Visa and Amazon and. Last October, 13 alleged members of the group of hackers were indicted in the US for a series of attacks against US companies and organizations.

For you not become the weakest link in cybersecurity, choose to have a VPN service today :. VPN encrypts your Internet connections and private guard the sites you visit and the information that you leave on these sites

Any information you send will go directly into your secure virtual tunnel. With the service VPN, you can easily direct your traffic from one of 20 available countries. Your computer and your mobile phone or tablet to connect to the Internet from any of these countries and no one can intercept your online business. You will be able to download all the content you want and even access blocked sites without any problems. Changing your IP simply by the service VPN is one of the most important steps to surf the Internet safely and anonymously.

Cybercrime, a difficult threat to evaluate

12:55:00 PM Add Comment
Cybercrime, a difficult threat to evaluate -

cyber attacks are increasingly, via the Internet scams are becoming more sophisticated as criminals hone their attacks like true professionals. Cybercrime has never been heavy and threatening, while specialists are struggling to determine its extent

"Cybercrime statistics do not work. Sometimes you multiply that by ten, because people do are not aware of being a victim, but also because some of them, such as businesses, are reluctant to complain because they fear it may have some negative impact on their image, "said the Lieutenant Philippe -Colonel Mirabeau, in charge of cybersecurity within the French police.

The French National Observatory for responses to crime and criminal (ONDRP) admits that offenses recorded by the police does not represent "a direct measure of phenomena related to cybercrime."

in its latest review, ONDRP saw a sharp increase in fraudulent access or maintain an automated data processing system, common in the theft of data on companies, which amounted to 1,427 in in 2012 against 419 in 09 (+ 240%).

ONDRP evaluates the targeted 42% increase in 2012 in the cyberworld, with criminals increasingly targeting small businesses and subcontractors to achieve more.

"Before, we used to meet on the battlefield, now is the Internet," said Jean-Marc Grémy.

Governments are also concerned. In 2012, during the French presidency of the G20, the home of the state and the Ministry of Finance have been targeted by a major cyberattack. These major attacks occurred in several countries, including Estonia, the United States and Canada.

These risks are all the more serious that organized criminal groups, who were drug professionals, vehicles and prostitution are evolving cybercrime, which is much more lucrative with less criminals risks.

more, criminal networks are becoming more professional, trying to recover some computer experts, who were economic victims and are likely to put their skills to their separation.

"We can not focus only on the facts alleged. We need a broader response, more transversal, allowing us to anticipate these new forms of cyber threats," said the experts of the Central Police (DCPJ).

to prevent cybercrime, opt for a VPN service today: the VPN encrypts your Internet connections and keeps private the sites you visit and the information that you leave on these sites

Any information you send will go directly into your secure virtual tunnel .. with the service VPN, you can easily direct your traffic from one of 20 available countries. Your computer and your mobile phone or tablet to connect to the Internet from any of these countries and no one can intercept your online business. You will be able to download all the content you want and even access blocked sites without any problems. Changing your IP simply by the service VPN is one of the most important steps to surf the Internet safely and anonymously.

10:53:00 PM Add Comment
-

We Internet access Internet access private and activism digital rights here private care deeply about privacy and digital rights.

First, we fight for privacy by building a product that protects millions of people worldwide. But this doesn, AOT engagement stop there. That, AOS why we, AOD announce some of our initiatives to further protect your privacy:

  1. configuration We, AOVE a maintenance / donating a large amount of dollar ($ 20,000.00 / month USD ) recurring to the EFF.
  2. We, AOVE install a maintenance / donating a large amount of recurring dollars ($ 14,000.00 / month USD) for the fight against the future.
  3. respectable defender of civil liberties and creator of the political Pirate Party, Rick Falkvinge, joined full-time private Internet¬ † Access as Head of Privacy.
  4. We continue to donate to open source projects and activism groups for privacy and campaigns everywhere.

Moreover, we Aore blessed to be able to pursue the responsibility to protect the privacy of society. Thank you for giving us this
opportunity.

Sincerely,
The private Internet access Family

Orange provides its data to the French secret service

11:54:00 AM Add Comment
Orange provides its data to the French secret service -

orange is a major player in the French surveillance system. This has just been revealed by an internal document of the British Secret Service (GCHQ). Indeed, in this note, it is said that the French secret service (DGSE) has worked closely with "a French telecommunications operator." But the description of the specific competencies of the telecommunications company, the history of this relationship, brings everyone to the former France Telecom now orange.

DGSE and major French telecom operators cooperate to improve the national interception of communications networks and collaborate to replace the encryption of data flowing through the network.

this note was among the NSA's archives, which were released by former NSA consultant Edward Snowden. the relationship between the DGSE and the french operator is an advantage key compared to other Western intelligence services. One of the strengths of the DGSE comes primarily of authorizations to access data of customers, France Telecom Orange. Without control, the operator provides a complete and free access to its networks and hosted data stream.

Millions of French but also foreigners have been targeted by this unlimited collection of data, which serves not only the DGSE, but also the French intelligence agencies. This data is also shared with foreign partners as GCHQ. The French operator also develops research on cryptology in partnership with the DGSE.

Neither the DGSE, nor the government, which now owns 27% of shares in France Telecom commented on the revelations. The expertise of this company, which was first administration, was and is essential to the national security and the independent decision of the French leaders.

"The relationship between France Telecom and the DGSE is not the same as the one in the Prism NSA program, which meant a contractual relationship with the giants of the Internet, says a former head of service french intelligence. in France, it is consubstantial. "There is no formal cooperation between the DGSE and the France Telecom-Orange. This partnership is done by people who have access to information top secret and can sometimes work for the operator or the DGSE. This is not new and has been the case for at least thirty years.

"mass transit data is stored for internal use and informally, said a official in charge of the networks within the operator. But the essential point is access to your ISP ... [to cross] the flow of data and the identity of those who exchange them. It is for this reason that the DGSE is in contact with all the French operators. "

To encrypt your data over an Internet connection is essential if you want to protect your privacy. The VPN uses the AES-256 algorithm to encrypt all traffic through its servers, worldwide

AES means "advanced coding Standards." - A standard symmetric encryption, which has been extensively tested and analyzed.

With this extremely strong encryption, hacking any connection or an external system trying to decipher the data through the tunnel VPN may not work. Your personal data and your online business remain private, even when your mobile device.

Recommendations TLS heartbleed - The message from the CEO

9:52:00 PM Add Comment
Recommendations TLS heartbleed - The message from the CEO - VPN

in the light of recent events involving the recently discovered vulnerability in OpenSSL, we want to draw your attention to a few things.

First, we have thoroughly checked our network and infrastructure and can confirm that any of the VPN servers or infrastructure is vulnerable to the new OpenSSL bug heartbleed . is and has always been safe to use VPN.

Second, we want to explain how you heartbleed can have an impact.

This vulnerability allows attackers to not only get full access to targeted systems, but also to divert its SSL certificates and private keys. There are over half a million vulnerable sites, and it is very likely that their SSL certificates can be, or may have already been stolen.

As webmasters struggling to solve this problem, we believe that a significant amount of vulnerable websites will not perform all the necessary steps, as these include routine methods and complexes, such as SSL certificate revocation and renewal. Obviously some pirate groups already collect SSL identities of all vulnerable hosts to reproduce attacks later.

In this way, even if the OpenSSL vulnerability is fixed, if the SSL certificate is the same for a fraudster can produce a "Man in the Middle" attack. This type of attack allows the interception of all traffic between the victim and webhost, including your passwords, user names and other sensitive data.

Case intercepted SSL certificate attacks possible, even against websites with SSL. This means that even if a victim uses https: // and a sign of SSL in the green address bar, its data can be intercepted. This type of attack was rarely possible earlier that SSL certificates are generally well protected by webhosts; However, heartbleed makes this attack possible, as it allows hackers to expose the host's SSL identity.

The best way to protect against this is to use VPN.

users with the VPN active VPN connection will prevent any type of "Man in the Middle" attacks, as all their traffic will pass through an encrypted tunnel using secure DNS servers and trust. The VPN makes it impossible to re-route your traffic or poison.

Therefore, we encourage you to use VPN for all networks that are not trusted networks.

Stay safe!

team VPN

Russia: new laws "anti terrorist" targeting blogs

8:51:00 PM Add Comment
Russia: new laws "anti terrorist" targeting blogs -

the lower house of Russian parliament adopted on 22 April several laws strengthening the authorities' control on blogs and empowering censorship increasingly strong Russian internet, and the penalties for "mass disorders" a common charge for various opponents.

After several readings, the State Duma passed a law requiring blogs to fulfill the same obligations as the media, in a series of "anti-terrorist".

According to this text, any blogger whose site receives more than 3000 visitors per day should report to Roskomnadzor, the media supervisory authority, and to keep all the data for six months.

the bloggers, who should publish their names on their website should also check the accuracy of their information and indicate an age limit suitable for visitors.

Thanks to this law, Roskomnadzor, which blocked access to several sites of critical information against the Kremlin in March, is to establish a list of the most popular blogs. These blogs will comply with their new obligations within ten days not to be fines of up to € 10,000.

The text also strengthens the powers of the Russian Federal Security Service (FSB, former KGB), including facilitating searches of people suspected of wanting to commit crimes or acts of terrorism.

Using a VPN is a safe and effective way to fight against censorship. With VPN, you can choose to base your connection in one of 50 countries where access is not filtered or restricted. You can then access the sites you want to anonymously without spying eyes to look over your Internet activity. Choose a VPN service today and enjoy Premium offer VPN to surf safely.

Only 14% of the world population has access to free media

7:50:00 PM Add Comment
Only 14% of the world population has access to free media -

media freedom experienced its darkest years of the decade, especially in Egypt, Turkey, Ukraine, but also in the United States on national security issues, as denounced by a study conducted by an American NGO freedom House called.

Various cases where press freedom has been violated were studied: control of information, physical or psychological harassment of journalists covering protests or other sensitive subjects, restricted access to journalists foreign, economic and legal constraints on press, online media and social media, political pressure on the editorial line of the media ...

the annual report of the NGOs, only 14% of the world population has access to the media "free", meaning that one in September the report also reveals that 44% of the world population lives in areas where the media is "not free" and 42% in areas where the media is "partly free".

Of the 197 countries and territories surveyed in 2013, Freedom House lists 63 "free" countries, 68 are "partly free" and 66 "not free". global assessment implies that the news media freedom fell to its lowest level since 04 and the number of people with access to free media is at its lowest since 1996.

"We seeing a general decline of media freedom, with governments and private actors who attack journalists or by prohibiting their access to events, using censorship, or pull for political reasons, "said the NGOs.

Among the countries where the media are muzzled more, the price is going to North Korea. Belarus, Cuba, Equatorial Guinea, Eritrea, Iran, Turkmenistan and Uzbekistan are also stigmatized.
"In these states, independent media are nonexistent or barely able to operate, the press acts as spokesman for the regime, citizens' access to unbiased information is severely limited," said the study however, positive changes and the opening has been reported in Cuba. Nordic countries (the Netherlands, Norway and Sweden) are more countries where the media are freer.

Although the record is a little weighed down by China, considered "non-free" and India, "partly free" because the two countries account for over a third of the world population.

regarding the United States, they see their score drop compared to 2012, because "officials are not willing to provide information to the media" and target journalists in criminal investigations.

to have access to free media and avoid censorship on the Internet, use VPN services that allow you to choose your login countries. Wherever you live, you can choose to set your connection in one of the 114 countries where access is not restricted. You can then access the sites of your choice with complete anonymity, without incurring the heavy retaliation from censorship. Choose VPN today and enjoy its Offer Premium VPN for surfing safely.

How to Watch the Olympics online with VPN?

6:49:00 PM Add Comment
How to Watch the Olympics online with VPN? -

The whole world is glued to their television screens to watch the London Olympics 2012.
you want to know how to watch the Olympics using the VPN to see coverage of other major television networks?

If you want to see the cover of the UK by the BBC, log on our server in UK with your VPN and watch live 2012 Olympic Games at the site of the BBC. http://www.bbc.co.uk/sport/live-video (available in the UK only IP)

For francophones, French using our server and watch the games live at http: / /www.francetv.fr/sport/les-jeux-olympiques-2012/direct.
But perhaps you prefer the American NBC coverage? Then connect to our US server and watch the 2012 Olympics online http://www.nbcolympics.com/liveextra/index.html. To watch live, you'll also need a subscription to cable TV, satellite or telco that includes CNBC and MSNBC. There is no additional charge for this service NBC.

Do not consider your VPN yet? Subscribe for free trial now www.le-vpn.com or www.le-vpn.com/fr (in French), and make the most of the Games!

Spotify abroad, even when traveling!

5:48:00 PM Add Comment
Spotify abroad, even when traveling! -

you know when traveling and the IP address of your computer connection changes to one of the new country, you can not use Spotify?

when you open the Spotify application abroad, you get the following message: "Your country does not match the one set in your profile to continue to use, update your profile or update. upgrade your Spotify account for unlimited travel. "

Spotify abroad without VPN | unblock spotify
How to overcome these borders of countries without spending extra $ to upgrade an account? Use VPN to unblock Spotify Spotify if your account is declared in one of the following 114 countries where we have our servers: USA, Canada, UK, France, Switzerland, Netherlands, Belgium, Germany, Russia, India, Australia, Japan and many other countries.

Simply connect to the server in your home country, for which you have configured the Spotify account, and enjoy your favorite music everywhere!

Spotify abroad with Le VPN

week of online safety awareness at the 9th Annual National Security Cyber ​​Month (US)

4:47:00 PM Add Comment
week of online safety awareness at the 9th Annual National Security Cyber ​​Month (US) -
The month of October is traditionally a month of awareness Cyber ​​national security in the United States. This tradition was started 9 years ago by the Department of Homeland Security, National Cyber ​​Security Alliance and the Multi-State Information and Analysis Center working together to promote awareness of Internet safety to the public, as their partners in the private sector.
Every week in October has its own theme, and now we are in week 3 that is dedicated to online security for Business / Industry.
more and more companies suffer attacks online on their website and networks and are at serious risk of theft of their intellectual property. Same hazards are running individuals when they connect online via insecure networks and not use such online security tools as a VPN connection. The risks of cybercrime are particularly high when you connect via WiFi hotspots and make purchases online. In this case, a connection to a virtual private network as VPN is a must.

Staysafeonline.org published some tips for individuals and businesses on how to protect yourself online. Feel free to learn more about Online safety tips and stay safe!

Virtual vpn- Steps to protect yourself against online piracy and theft

3:46:00 PM Add Comment
Virtual vpn- Steps to protect yourself against online piracy and theft -
Virtual VPN- Steps to help Protect yourself from online hackers and thieves

Online hackingis a very common occurrence in today's world. The Internet is a place for all good things and all the bad things. Hackers are able to enter your personal files, perfecting your identity and use your online presence against your character. If you have things like online banking up on your computer as well, so it is not safe from hackers either. A great way to ensure you're protected when you're online is to use a virtual VPN.
A Virtual VPN will allow you to remain anonymous when surfing the web. You will not log on to your computer using the IP address of your ISP. You'll get another IP address that belongs to the VPN service provider. It makes you unable to track pirates. It is a great way to ensure your files and documents remain secure and your online security is strengthened. A virtual VPN is not difficult to use at all. All you need to do is find a trusted supplier, to connect to the VPN each time you access the Web, and then you are set to go.
of course you should take more preventive means to protect themselves from piracy line as to ensure that you never give any personal information away online. Do not reply to spam emails that ask you for your bank information and promote you to fill out forms on yourself.
When you get on Facebook and the like, so many people are tempted to post all their information, and it is very public. Yes, you have friends and family, but there are some things you should really keep hidden. Do not post things like "I'm traveling tomorrow or let people know that you have to register with a local bank, etc. Common sense will keep you from online fraud and hacking.

Shutdowns are Internet Trivial but not Syria

2:45:00 PM Add Comment
Shutdowns are Internet Trivial but not Syria -

If for the United Nations World Conference regarding how International Telecommunication comes is a successful meeting, it will stop the Internet that has been tested in Syria action legally supported for all countries of the world. Now that Syria has regained access to the Internet, technical experts entered other conversations on the reasoning why the government has forced Internet outages are able to produce.

According to experts Renesys, the survival of the Internet is based on decentralization. However, decentralization is not uniform throughout the world. In some countries around the world, international access to telecommunications services and data services is governed by their government.
He is widely known that the government of Syria was the main reason why Internet communications were close. This is actually not the first time that the Internet has been closed in the country. The last time that Syria decided to close the Internet was just in time for the biggest anti-government demonstration to start. This protest was responsible for the deaths of more than seventy-two citizens. Many living in Arab countries already using VPN providers to be able to fully access all the resources that the Internet has to offer. A VPN bypasses all the blocks and restrictions that your IP provider has commissioned new courses and events available again.