MPLS vs. VPN: what’s the difference?

VPNs and MPLS systems are two different technological solutions for online privacy. So how do they work? And which one should you choose? What is an MPLS? First, let’s discuss how the “normal” routing works. When you visit any website on your browser, there are a lot of interesting things happening…

MAC randomization fails to protect mobile users from tracking

It is hard to think of a better device for user tracking than smartphones or tablets. People carry them everywhere, and, in most cases, with Wi-Fi enabled. When hopping between wireless networks, it allows third-parties to monitor and track your movement according to your device. In order to address this privacy…

What to do if Skype is blocked in your country

People love using Skype to video chat with their family and friends, but in some countries, Skype and other video calling software can be limited or completely blocked. Why would those countries want to block these services and is there an alternative? Why certain countries block Skype The censorship of Skype…

How to send a secure email attachment

If you need to send sensitive or private information via email, it is vital that you encrypt those files to ensure that they cannot be intercepted or accessed by your email provider. Regular email attachments are unprotected, which means that they are delivered in a potentially accessible state. As a…

How to find your network security key

Do you know your network security key? And what is a network security key anyway? More commonly referred to as a Wi-Fi password, this login information keeps your personal internet connection secure. Contents How to find your network security key How to find your network security key Finding the network security…

The new NordVPN login and sign-up process explained

When you want to log into NordVPN, you can now do so via your Nord Account. This change allows us to streamline your experience and make staying secure even easier. And thanks to the new Nord Account process, you can log in using third-party authentication. Let’s explain exactly how that works,…

How North Korean hackers almost stole a billion dollars

In 2016, a group of state-sponsored North Korean hackers almost stole a billion dollars from Bangladesh’s national bank. Fortunately, most of the money wasn’t able to make its way back to North Korea. Here’s how a couple of oversights and sheer coincidences thwarted what would have been one of the biggest…

Why the US is ramping up its cyberdefenses

It seems that cybersecurity is no longer a private matter in the US: the National Guard is getting involved. Does proper online protection now require not only security software, but trained soldiers as well? US cyber attack simulation The US National Guard has just completed a two-week training session, during which…

How to block email tracking

Did you know that when you open an email, the sender can find out when and where you opened it? They do this by inserting a small piece of code in their promotional emails. This might not be a problem if you trust the company, but nowadays, almost anyone can use…