Censorship & Security Issues While Traveling

If you’re a frequent traveler, you likely know the headaches and risks that can arise with censorship, geographic restrictions and unsecured WiFi.

In our wired world, we often take for granted the ease and security of connecting to the Internet at home, and then when we travel, we’re suddenly hit with outrageous usage fees, limited access and compromised public WiFi that puts our data and identities at risk.

Well, we put together a fun infographic that demonstrates the censorship and security issues travelers face, as well as a solution that’ll remove the blocks and the worry!

Travel VPN Infographic

For more info about VPNs (virtual private networks), click here.

7 Rules for Safer Online Shopping

For most people online shopping has become the norm.

Our busy schedules prevent us from trekking to the mall every time we need something, so instead we visit online retailers to fulfill our shopping needs.

Safe online shopping

But, not all online shopping destinations are created equal, and while many sites are trustworthy and legitimate, there are a number of fake online retailers that are just waiting to rip you off.

Luckily, a little online shopping savvy can go a long way to protecting you, your money and your identity.

Read through our online shopping rules below to keep yourself safe online.

  1. Stick to sites that you know & trust. Instead of starting your online shopping with a search engine, begin at a trusted retailer like Amazon, Target, Lowe’s or Macy’s. Search engines can lead you to places that are not trustworthy, especially if you venture past the first page or two of search results. Also, check the spelling of the site’s name (Amazon.com versus Amazn.com*). Many “copycat” sites try to get your money by looking “familiar”, and check the top-level domain as well (Amazon.com versus Amazon.net*). *These are fictitious examples.
  2. Use credit cards. Credit cards tend to be the safest option for online shopping because you have recourse. If an ordered item is never delivered or you find fraudulent charges on your card, the credit card company will work with you to remedy those issues and get you your money back. But, if you use a debit card or give access to your bank account, it can be a lot more challenging to get your money back after you fall prey to a scam. Check your statements regularly, and keep an eye out for suspicious activity.
  3. Keep a paper trail. Whenever you make purchases online, be sure to save any and all documentation that you receive via email in an email folder or, better yet, print hard copies of receipts, terms of sale, product descriptions, and any emails that you exchange with the retailer. Again, this will be helpful and necessary should you find yourself the target on an online shopping scam.
  4. Only shop with the “lock”. Any time you’re about to make an online purchase, look for the lock. Make sure that the site has SSL (secure sockets layer) encryption installed. You can determine if it does because an SSL url will begin with https:// (instead of http://). Typically, a little lock icon will also appear next to the site’s url or in the status bar; another indication of a secure site.
  5. Shut down your machine. Do you typically leave your computer running and connected to the Internet 24/7? While that may seem like no big deal to you, it means that you’re leaving your machine open to cybercriminals all day and night. This gives hackers the opportunity to infest your system with malware and commit cybercrimes. Instead, after making a purchase, turn off your computer and protect yourself and your money!
  6. Don’t overshare! Only fill out the necessary (i.e. “starred”) information when making on online purchase. No online retailer needs your birth date, social security number, or other unnecessary personal data to complete your transaction. Don’t make it easy for online criminals, instead be cautious, don’t over share, and you’ll protect yourself from identity theft.
  7. Use a secure connection. Don’t conduct your online shopping while using unsecured public WiFi. This is an open invitation to hackers, peeping Toms, and identity theft. Instead, wait to make online purchases from a secure network like your home or place of work.

If you want to further protect yourself, your money and your identity while shopping online, consider getting a VPN. For more details about how a Virtual Private Network can improve your online experience, visit Ghost Path.

4 Questions to Ask BEFORE Buying a VPN

If you regularly use public WiFi, travel for work, worry about Internet security, or simply value you privacy, you’re probably considering getting a VPN (Virtual Private Network).

4 questions for your VPN provider

A VPN is essentially a protective “tunnel” that secures the connection between your laptop, smartphone or tablet and the Internet. This ensures that all your online activity is protected from hackers, peeping toms, or others with malicious intent who are using the same network.

But, before you got out and buy one, it’s important to consider your needs and usage habits so that you choose the best possible VPN for you!

Here are 4 questions to consider before you buy a VPN:

  1. Do you regularly travel out of the country? Many of your favorite services, like Netflix, Hulu, or Amazon on Demand, are blocked once you travel outside of the USA, and many decide to get a VPN to bypass these limitations. To ensure you get the right one for you, ask your VPN service provider if they have exit servers in the U.S. meaning that you can “appear” to be in the United States when you’re actually enjoying a cappuccino in Rome. (GhostPath VPN is totally equipped to help you bypass any foreign country limitation, so you can catch up on House of Cards even while you’re abroad.)
  2. Can it be used across all your devices? You may think you only need a VPN for your computer, but the truth is more and more Internet security breaches are occurring on our smartphones and tablets because they’re portable and we can easily use them in public (often on unsecured WiFi networks). (Our GhostPath VPN works seamlessly with laptops, computers, smartphones and tablets, so no matter what device you’re using, you’re covered!)
  3. Can I use it on my router? Using a VPN in conjunction with your wireless router is a great way to protect all of your internet connected devices in one fell swoop. (GhostPath supports using DD-WRT to connect to the VPN at the router level, meaning all your internet connected devices are protected. Keep in mind DD-WRT will only work if it’s supported by your router.)
  4. Are there any limitations? Make sure to ask about bandwidth limitations, as that can greatly impact your user experience. Also, ask if the VPN you’re considering works with all service providers. (GhostPath syncs with all major operating systems including Windows, Mac OS X, Ubuntu, Android, and iOS. And, there are no download limits, no throttling, and no maximum number of server changes! You are free to use our service however you see fit.)

Click here for more information on our VPN service.

 

Some questions inspired by this post from PC World.

The Actual Time It Takes Hackers To Crack a Password + Celeb Phone Hacking

How long does it take to break a password?Do you ever wonder how secure your passwords are?

In light of the recent celebrity phone hacking scandal which resulted in revealing pictures of 100 celebs being posted and shared online and via social media, you’re probably wondering how secure your own passwords are.

The hacker, in this case, “took advantage of a security flaw in Apple’s online backup service, iCloud. Many online services lock someone out after several unsuccessful attempts to log in, but not Apple’s Find My iPhone app and iCloud. That has been changed by Apple in the aftermath of the nude celebrity photo scandal. But with unlimited guesses, a computer program can generate and test thousands of potential passwords until an account is entered. It is called a brute force attack. The tendency of many people to choose weak passwords and to use the same password for each service helped. Once a celebrity’s Find My iPhone app password is discovered, the same password often can access iCloud. People might never know their accounts have been compromised.” (quote from CNN.com)

With that in mind, if your passwords resemble something along the lines of “123456” or “password” or you use the same password for all sites, you’re putting yourself unnecessarily at risk.

Smart hackers are adept at breaking codes in little time, and when you use a simple or common password, you’re opening yourself up to be the victim of online crime.

Here is the actual time it take a hacker to break a password:

  • Lowercase, 6 characters = 5 minutes
  • Lowercase, 9 characters = 2 months
  • Uppercase & Lowercase, 6 characters = 5.5 hours
  • Uppercase & Lowercase, 9 characters = 88 years
  • 6 characters with numbers & symbols = 8.5 days
  • 9 characters with numbers & symbols = 19,985 years

As you can see, adding a length and complexity to your passwords pays off BIG TIME.

Here’s a little tip, instead of using simple words for your passwords, use phrases. For example: “Time flies when you’re having fun!” becomes “TFlyzwhenurhavinFUN!”

A password like that won’t be cracked for millennia! 

And, be sure to use a different password or password variation for every site with a secure log-in.

For extra protection, look into a Virtual Private Network to protect your data and privacy on all your devices, anywhere in the world! Read more HERE.

For the full scoop on the celebrity phone hacking scandal, watch the video below.

Screen Shot 2014-09-05 at 10.38.23 AM

 

This post was inspired by an element of this infographic.

Back To School Online Safety Tips + Video

In between back-to-school shopping, end of summer activities, and gearing up for yet another school year, it’s important to talk to your kids (no matter what age!) about being safe online.

Screen Shot 2014-08-11 at 11.56.51 AM

Over the summer, warm weather, vacations, camp, and playdates keep kids busy (and offline), but the school year means that the Internet will yet again play a major role in their lives as they do homework, study, and do research for school projects. And, the more time they spend online, the more vulnerable they are to being preyed upon by cybercriminals.

To ensure that your kids are well-prepared for a safe and productive school year, use these guidelines below to discuss smart online practices. Then, watch the “Online Safety Tip” video with them — it covers some important topics, too!

1. Don’t Talk To Strangers Online.

This may seem like a given, but many kids view the Internet as a safe, protected place. And, because of that, they can often over-share personal data like their name, age, address or passwords. Teach your kids the importance of staying vigilant even when online, and you’ll protect not only them, but your whole family, from malicious threats.

2. Don’t Post Anything You Wouldn’t Want Your Parents & Teachers To See.

A great rule of thumb is to teach your kids not to post or share anything online that they wouldn’t feel comfortable with you or their teachers seeing. Even if they think they are sharing something in a private, closed forum, you never know who might “share” it, and who may end up seeing it in the end!

3. Use Long & Strong Passwords.

Inform your kids about the importance of using long, strong passwords for all their accounts. A hacker can crack a 6 letter, all lower case password in mere minutes. Instead, encourage them to use passwords that are 8+ characters long and include a combination of upper and lower case, numbers and symbols.

4. Monitor Online Conversations.

It’s essential to keep tabs on your kids’ online conversations via IM, email and social media. For this, you can use parental control software and also talk to your kids about appropriate vs. inappropriate online discussions. A sit-down family chat around the dinner table will do wonders!

5. Make Sure All Devices Have Security Measures In Place.

Kids access the internet in a variety of ways and at a variety of locations. That’s why it’s vital to consider putting safety precautions in place that will protect them in as many instances as possible. Install antivirus software with a strong firewall, and consider using a VPN to further protect your data and identity from cybercriminals.

Online Safety Tips: Send Kids Back-To-School With Cyber-Security

For more info about using a VPN to protect you and your children, check out GhostPath’s services HERE.

10 People Who Should Be Using A VPN

Screen Shot 2014-07-21 at 10.21.07 AMFirst off, let’s start with the basics: what is a VPN?

VPN stands for Virtual Private Network is a way of adding security and privacy to both public (like coffee house WiFi) and private networks (like your home or office WiFi). It enables you to freely use and browse the Internet without the fear of putting yourself at risk of cybercrimes, hackers, or geographic restrictions.

Needless to say, a VPN service is highly useful and can benefit a number of different people with various needs.

Here is a list of 10 types of people who should be using a VPN:

1. Any who uses public WiFi at hotels, airports, coffee shops, restaurants, etc.

2. People who enjoy streaming content using Hulu, Netflix, Pandora, etc.

3. Employees and students who want to break out of restricted networks at work or school.

4. Anyone who likes to download/upload P2P files anonymously.

5. Vacationers who want to watch home-specific entertainment while traveling, like sporting events, local TV, etc.

6. People who want to secure their online phone calls to prevent eavesdropping.

7. Business travelers who need to bypass countries’ web censorship and content surveillance restrictions.

8. Anyone who does not want their searches logged & recorded by search engines like Google, Bing & Yahoo.

9. People who work with sensitive issues and wish to avoid reprisals & tracebacks because of research like journalists, market researchers, detectives, and lawyers.

10. All who believe that privacy is a basic right!

Do you fall into one or more of these categories?

Then you will enjoy & greatly benefit from using a VPN service.

For more information about how a Virtual Private Network can improve your online experience, click HERE.

 

Photo & 10 categories originally presented by Net For Beginners.

 

 

4 Less-Common Mistakes You’re Making Online That Are Putting You At Risk

Screen Shot 2014-07-15 at 10.29.47 AMWe all know that we shouldn’t use the same password for all our accounts or share our login information with others, but so much of our lives nowadays are spent online that it’s easy to develop some other bad habits that may be putting you at risk.

Everything we do, say or post online has the potential of being seen by hundreds if not thousands of people, and while the majority of those eyes are likely harmless, if your personal info gets in front of the wrong person, it could cost you your privacy, money and countless headaches.

Below are 4 less-common mistakes that you may be making online that are putting you at risk.

1. Saving your personal information

Many sites, such as online stores, credit cards and even banking sites, give you the option of saving your personal information for quicker login, transactions or purchases. But, despite the added convenience, anytime you save your personal data online you’re putting yourself at risk. Instead of saving your login information and maybe even your credit card number, opt to enter it yourself each time. Sure, it takes a few extra minutes, but it could save you thousands in fraudulent charges!

2. Using public Wi-Fi

Sure, it’s convenient and seems harmless enough, but any time you use public Wi-Fi you’re opening yourself up to potential hacking. Instead of compromising your personal data, avoid banking, accessing your credit cards or shopping online while connected to a public network.

3. Using your debit card for online purchases

When you use your debit card, you’re giving hackers access to your personal bank account. Instead of opening yourself up to the headache of trying to recoup your money after an online breach, protect yourself my designating one credit card with a low-limit for all your online purchases. That way, if it becomes compromised, you know exactly where to look and can easily remedy the issue.

4. Clicking links in emails

You should never, ever click a link or open an attachment in an email from an unknown or suspicious sender. Malicious links and downloads find their way into our inboxes all the time, but if you’re alert, you won’t become a victim of whatever virus is being spread. However, sometimes these links can even come from familiar email addresses, but that doesn’t mean they should be trusted. If you suspect a link might put you at risk, don’t open it — even if it came from a friend. Instead, respond to the email and ask if they truly meant to send it.

To further protect your data, personal info and privacy, consider using a VPN service. For more information about how a VPN can protect you online, visit www.GhostPath.com.

 

How Safety Savvy Are You Online? Take The Quiz To Find Out!

Few of us go a day (or more likely a few hours!) without going online, whether it be to check our email, do research for work, look-up a funny YouTube clip, peruse our social media accounts, or simply pass the time.

But, with so much time spent in cyberspace, we’re also putting ourselves at risk for hacking, identity theft and scams.

If you’re wondering how online safety savvy you are and if you’re putting yourself at risk, take this fun, 6-question quiz to find out.

Want to boost your online safety?

Sign-up for GhostPath’s VPN service & enjoy a 7-day money back guarantee!

How To Access Blocked Websites

Screen Shot 2014-07-09 at 11.03.04 AMLast week, we investigated blocked content and websites throughout the world, and the list was staggering!

[Missed that blog post? Read “What Content is Blocked Throughout The World” here.]

If you travel abroad for work, have to deal with strict office restrictions, or are frustrated by “blackout zones” on sites like MLB.TV, we’ve compiled a list of easy ways to bypass these setbacks so that you can access any website you choose.

  1. Use a proxy browser extension – The easiest (though somewhat slow and unreliable) way to gain access to blocked websites is via a proxy browser extension like Hola or Stealthy. This will enable you to visit the website using a proxy server based in another geographic location, thus freeing up the blocked content.
  2. Get a VPN – A VPN, or Virtual Private Network, is an effective, faster, more reliable way to bypass country restrictions. A VPN will mask your IP address and geographic location so that you can visit any website you choose from anywhere in the world. Read more here.
  3. Try a translation service – Check out a translation service, like Microsoft Translator or Google Translate. These sites will display a website for you without you having to visit the page directly, thus acting like proxy server. This method is not 100% foolproof, and not nearly as reliable as a VPN, but it’s a potential workaround if need be.

Tired of restrictions? Try GhostPath VPN for just $10/month with our no-risk 7-day money back guarantee!