Tech Talk

Join the SCAM Fighters

Posted 6/9/20

Do you know what a VPN is? It stands for “Virtual Private Network.”

It’s a digital middleman that creates a secure internet connection. The encrypted connection protects your location and …

This item is available in full to subscribers.

Subscribe to continue reading. Already a subscriber? Sign in

Get 50% of all subscriptions for a limited time. Subscribe today.

You can cancel anytime.
 

Please log in to continue

Log in

Tech Talk

Join the SCAM Fighters

Posted

Do you know what a VPN is? It stands for “Virtual Private Network.”
It’s a digital middleman that creates a secure internet connection. The encrypted connection protects your location and identity online.
Remember VPNs will help you protect some aspects of your online identity. You still need anti-virus and anti-malware protection for your computer, phone or tablet.
Not all VPNs are created equal.
Cybersecurity experts at VPNpro identified vulnerabilities in PrivateVPN, Betternet and others that allowed connections to be intercepted, connected to and worse.
The full report: https://vpnpro.com/blog/privatevpn-betternet-vulnerabilities/ 
Betternet and PrivateVPN claim to have resolved those their software issues.
If you don’t want to risk it, VPNpro recommends SurfShark, NordVPN, ExpressVPN and TunnelBear. All of these passed their test on the first try.
Not sure what to look for in a VPN? Malwarebytes experts suggest:
1. Do research. In the past VPNs have been used by cyber-criminals to track activity, which is the opposite of what you want. Do your research to avoid being tricked. Reputable tech sites like Cnet.com, PCmag.com and Techradar.com review VPN services. Check out the annual “best of” lists for your next VPN. You can also search for reviews of the specific VPN you’re interested in.
2. Remember free VPNs are risky. According to Malwarebytes, “free vs. paid” is the litmus test for VPNs. Legitimate VPNs will cost you money, even if it’s just a few dollars a month. Free VPNs, they say, are generally run by criminals for criminals or are riddled with vulnerabilities or viruses.
   Next week: Find out if your information was part of a data breach.

Comments

No comments on this item Please log in to comment by clicking here