First blog post

This is the excerpt for your very first post.


Honest review of the ProtonVPN service

Since the official public launch, I have received dozens of emails (and Twitter DMs) from readers asking me to review ProtonVPN.  A group of scientists with a track record of building secure products (ProtonMail) designed ProtonVPN from the ground up to be safe and privacy-enhancing.  The promise is that they will bring the same end… Continue reading Honest review of the ProtonVPN service

Beware of the fake VPN provides

I’ve written 2 reviews for VPN Services recently: VyprVPN Review KeepSolid VPN Unlimited Review I’ve also written 2 reviews for WIFI VPN/TOR portable boxes: Anonabox Review Invizbox Go Review One item I have never covered is the proliferation of scammy VPN services sold by snake oil salesmen.  With the Edward Snowden leaks and all the media… Continue reading Beware of the fake VPN provides

KeepSolid VPN Unlimited Review

VPN Unlimited is one of the most popular VPN services available and for good reason. It is fast, reliable and competitively priced (deal below). VPN Unlimited is a USA based provider and offers termination in more than 30 countries (with multiple locations in most countries). VPN Unlimited has good platform support (Windows, Mac, iPhone, iPad,… Continue reading KeepSolid VPN Unlimited Review

VyprVPN Review

VyprVPN owns and manages its own networks and servers. During my recent VPN testing shoot-out, VyprVPN consistently ranked as one of the fastest VPN providers out there.  In addition to raw speed, they have an incredible list of supported clients from traditional PCs (Mac, Windows, Linux), to routers (DDWRT, OpenWRT, AsusWRT), smartphones (iPhone, Android, Blackphone,… Continue reading VyprVPN Review

How to protect your PC from infection

Think of all the valuable data your PC contains (pictures, files, invoices, contacts, etc). Now imagine losing all of that data Virus’ are still a thing but you should be more worried about ransomware, worms and all of the other digital creepy crawlies roaming the net looking to make you their next victim. Go read… Continue reading How to protect your PC from infection

Your cloud provider is making you a target

Phishing is a powerful and effective tool and a favorite in the threat actor arsenal. So what happens when your cloud provider gives threat actors a roadmap to steal from you? A couple of weeks ago, Workday sent a security advisory to its customers regarding a phishing campaign targeting its customers. Although details of the… Continue reading Your cloud provider is making you a target