Archive | Uncategorized

Blog Hotspot Shield_Fight215

“Fight215”: Call Congress to End NSA Mass Surveillance

What is section 215? It’s the authority that the National Security Agency (NSA), with the FBI’s help, has interpreted to allow the U.S. government to vacuum up the call records of millions of innocent people. What is fight 215? Spearheaded by the Electronic Frontier Foundation (EFF), a coalition of 34 organizations from across the political spectrum recently […]

Continue Reading · 0
Blog Hotspot Shield_Jonathan Granoff - Global Security Institute

Living, and Illuminating, Peace: A Message from Global Security Institute’s President

The necessity of human solidarity must not be trumped by the divisiveness of nuclear weapons. This was part of the historic message expressing the ideas of His Holiness Pope Francis shared at the recent conference in Vienna on the humanitarian consequences of nuclear weapons. The World Evangelical Alliance, representing over 600,000,000 Christians, is similarly calling […]

Continue Reading · 0
Blog_Privacy & Security in the Internet Age

Privacy and Security in the Internet Age

Anchorfree’s CEO David Gorodyansky recently published an article on, bringing to light the importance of privacy and security in the Internet age. Here are the key points mentioned in the article. The Obama Administration is ramping up efforts to strengthen America’s cybersecurity and make it more difficult for hackers to damage our economy and threaten […]

Continue Reading · 0

Support Privacy as a Human Right

Do you support privacy as a human right? Anchorfree’s CEO, David Gorodyansky, will be speaking on this topic at SXSW 2015 with your help. SXSW (South by Southwest) is a set of film, interactive, and music festivals and conferences that take place annually in Austin, Texas in mid-March. Each year, thousands of entries are submitted. […]

Continue Reading · 0
google glass

Google Glass – Are the Privacy Fears Justified?

Google has been celebrating the May 2014 public release of its Google Glass with a traveling road show that allows tech-heads to play with the wearable technology. At the shows Google employees and early adopters known as Google Glass “Explorers” extol the virtues of the Internet-capable eyewear, which contains a built-in camera. However, the device […]

Continue Reading · 0
cyber bullying

Using Modern Tech to Catch Cyberbullies

If your child has ever been bullied, then you already know how much pain it causes, especially when the bullying goes from the classroom to the Internet. Online identities give users a certain level of anonymity when it comes to cyberbullying, but parents and law enforcement are using the very technology bullies abuse to catch […]

Continue Reading · 1

Turkish Citizens Easily Circumvented Twitter Ban with Hotspot Shield

Last Thursday, Turkish Prime Minister Recep Tayyip Erdogan imposed a ban on Twitter. Thanks to technologies such as Hotspot Shield VPN, many local users were able to circumvent the restrictions and continued broadcasting their tweets. Calling social media a “menace to society”, Erdogan promised to “wipe out Twitter.” He had previously threatened to ban Facebook and YouTube […]

Continue Reading · 3
cyber attacks on US banks

10 Simple Tips to Bank Safely Online

One of the issues I’m passionate about, as an online-security analyst, is that of banking safely online. As such, I recommend the following simple tips to help ensure your security in cyberspace when doing online banking. Wired ethernet link. This offers more security than does a powerline or Wi-Fi network. In fact, the powerline carries […]

Continue Reading · 0

22 Shocking Email Security Statistics [Infographic]

Ever wondered what happened to that email attachment you sent? A brand new infographic by docTrackr gives us a look into 22 of the most shocking ways your email is at risk. These statistics highlight the importance of securing important email correspondence, something docTrackr has been working on with their free Gmail Security Extension. Whether its […]

Continue Reading · 0