Internet of Things: Security and Risk Management

Posted by Roselyna on 12-Jan-2017 00:00:00

Then

In 1982, a coca-cola machine became the first Internet-connected appliance in the world and the starts of IoT revolution. According to Wikipedia, the concept ofthe Internet of Things was invented by and term coined by Peter T. Lewis in September 1985 in a speech he delivered at a U.S. Federal Communications Commission (FCC) supported session at the Congressional Black Caucus 15th Legislative Weekend Conference.

Read More

Topics: Internet of Things, Risk Management, Control

To All Malaysians, Is Your Government Spying on You?

Posted by Aazean on 08-Jan-2017 13:39:52

If you clicked on this headline, you may have already had an inkling of it. You would have probably also heard in the news of the numerous media sites and blogs which are suspiciously blocked, especially whenever an election rolls around.

Read More

Topics: Internet Security, News

Internet of Things : Are you ready for IoT?

Posted by Roselyna on 05-Jan-2017 00:30:00

Do you have IoT?

Everyone has heard about Internet of Things (IoT) right about now. If you haven’t then it’s time to start using your search engines and start typing ‘iot’ or we can just plainly say, 'IoT are devices that is capable of connecting to the internet and does not belong in the category of smartphones, tablets, networking equipment, notebook or desktop computers'.

IoT can be your smart televisions, smart toasters, door locks, refrigerators, air-conditioning, CCTV, heaters, solar heaters, gates and whatever else that is connectable to the internet.

At the last estimated counts, there are about 30 billions IoT bought by consumers and growing at a rate of 5-6 bil annually over the next few years.

In other words, there are 30 billions devices that can be accessed from and to the Internet anytime and anywhere. For BolehVPN security team, the sheer numbers of IoT open up a lot of security and privacy concerns that consumers must be aware of.

Read More

Topics: Lifestyle Security, Network Security, Internet of Things

How to securely instant message online using OTR - Windows

Posted by Reuben on 03-Jan-2017 00:26:36

Communicating via instant messengers has been an increasingly important means of communication but how many of them are truly secure and protect your privacy especially when faced with widespread internet surveillance? In this guide we teach you how to use OTR messaging.

Read More

Topics: Internet Security

What You Should Look For in a P2P/Torrent VPN

Posted by Aazean on 18-Dec-2016 21:11:41

So you want to torrent and perform your peer-to-peer (P2P) downloading. But a niggling DMCA notice served up with a hefty fine are the last things you wish for.

Read More

Topics: P2P/Torrents

Why You Should Pay For Your VPN in Bitcoin

Posted by Aazean on 12-Dec-2016 08:57:31

Most VPN providers will offer customers various forms to pay for their VPN services. While in general most customers are happy paying for a VPN using a credit card or PayPal, the users who value financial anonymity would seek to deal their payments in cryptocurrencies.

Read More

Topics: Cryptocurrency, Bitcoin

7 Tips to Pick the Best Private VPN Service

Posted by Aazean on 04-Dec-2016 15:53:53

Firstly, what is a VPN? If you are reading this, you probably have a general idea what a VPN is or what it can do for you. In any case, a VPN (Virtual Private Network) is a network technology that creates a secure network connection over a public network such as the Internet or a private network owned by a service provider.

Read More

Topics: Internet Security

TOR vs VPN Comparisons

Posted by Reuben on 30-Nov-2016 14:50:22

A common question for the privacy conscious is what is TOR and how does it compare to a VPN? Also, what are the advantages of using TOR vs VPN and vice versa? First of all, TOR and VPNs aren't really direct competitors but can be seen as different solutions.

Read More

Topics: Internet Security

Why Your VPN Should Have a Warrant Canary

Posted by Aazean on 27-Nov-2016 12:43:46

In the US and for some foreign governments, they can serve secret warrants to Internet Service Providers, VPN providers and other services in the forms of government subpoenas or national security letters. Such warrants from law enforcement agencies are designed to force companies to hand over any records or information on their customers to conduct an investigation. They are often accompanied by a gag order preventing the company from alerting the target that they have been subjected to monitoring.

Read More

Topics: Internet Security

Keep Your iPhone Safe From Hackers

Posted by Aazean on 23-Oct-2016 15:35:52

Since the launch of the iPhone 7 and 7 Plus as well as the release of Apple’s iOS 10, there are heaps of cool, new features to play around with for an iPhone user. However, as your data should be one of the most valuable things you own, here are a couple of tips BolehVPN recommends you to use to protect your privacy and security on your iPhone:

Read More

Topics: Device Security