Blocked Content Throughout the World & How to Get Around It

Screen Shot 2014-07-08 at 10.22.44 AM

If you’ve ever been blocked from a website at work, have found yourself in an unexplainable “blackout zone” thanks to sites like MLB.TV, or have arrived in a foreign country only to discover that common sites like YouTube, Facebook or Twitter are banned, you know first-hand the frustration of restricted content!

Though the U.S.A. is the land of the free, there are many instances when we cannot access the websites we wish to visit, thanks to obstacles like workplace restrictions and blackout zones.

But, that’s not nothing compared to the blocked content you’ll encounter when you travel!

In China, you cannot access Facebook, Twitter, YouTube, Dropbox, Soundcloud, Blogspot, certain Yahoo sites, or Google (as well as many, many more). Yes, that’s right – you cannot use Google or any of the Google suite like Google+, Google Docs, Google Maps, or Google Drive! Restrictions like this can seriously impact your quality of life and productivity, especially if you’re traveling for work.

When traveling to India, be prepared to live without Mega, Rapidshare, Bitshare and other file storage and sharing sites, regional MP3 download sites, as well as torrent sites like Pirate Bay. But, perhaps the most perplexing is India’s ban of Google Docs and Google Video. In fact, “according to digital media focused website MediaNama, a Delhi high court order passed on 23 June 2014 instructs internet service providers (ISPs) to block as many as 472 websites” (source: The Times of India).

In Turkey, their 10m Twitter users are complaining. The website was blocked after the Prime Minister vowed to “wipe out Twitter” after the site brought to light allegations of corruption.

Other countries that have put a ban on social media sites such as Facebook, Twitter and YouTube include Iran, Vietnam, Pakistan, Eritrea and North Korea, among others.

And, you’ll even encounter censoring in the U.K. In fact, the Washington Post stated that the UK’s ISP filtering systems have “some of the strictest curbs on pornography in the Western world.” (source: Wikipedia) The UK’s new system has been the subject of much criticism ever since it was first introduced in 2013, though Prime Minister Cameron claims that users will have the option to turn the filters off if they so choose, but this has yet to be seen. In July 2014, Open Rights Group investigated and discovered that 19% of 100,000 much-trafficked sites were being blocked in the U.K., with “over-blocked” categories including: sex education, sexual health, help with sex & pornography addiction, support services for rape and abuse, child protection services, suicide prevention, libraries, drug advice, and even parliament, government and politicians’ sites! (source: Wikipedia)

Lastly, let’s cover the issue of watching Netflix, Hulu and other entertainment sites while abroad. Unfortunately, a number of countries don’t grant access to these sites, meaning that you can’t enjoy your favorite shows, entertainment or TV programs when you’re away from home.

If all this censorship has you bummed out, don’t fret. We’ll be back next week with guidelines about how to get around blocked content so that you can enjoy your favorite websites from anywhere in the world!

(Don’t want to wait until next week? Check out GhostPath’s VPN services here, and learn how to bypass MLB.TV’s blackout zones here.)

Cybercrime Report: Are You A Target?

The Internet and computers have become an integral part of our everyday lives.

We wake to our smartphone alarm clock, check our emails over breakfast on our tablet, and settle in at our work desks in front of our computers to conduct the morning’s to-dos…and that’s all before 10am.

Yet, despite the convenience of all this modern technology, it also means that cybercrimes like hacking and identify theft are on the rise.

Norton released their report on cybercrime in 2013, and the data is quite compelling.

First off, though, let’s give a little context as to the depth of this report. Norton collected data from over 13,000 online adults ages 18-64 from 24 different countries.

Below are a few key factors that we found particularly interesting from Norton’s report:

  • 64% of cybercrime victims are male.
  • 66% are millennials (as compared to baby boomers).
  • Common theme noticed in victims: Almost 1/2 of victims don’t use basic precautions like passwords or security software.
  • Among smartphone users, 38% have been a victim of mobile cybercrime in the last year.
  • There are 378 victims per year, which is more than 1 million per day, which translates to 12 victims per second.
  • Risky behavior: 39% of social media users don’t log-out after a session, 25% share their passwords with family & friends, and 31% connect with people they don’t know.

Check out the entire report below:


The Norton Report 2013 

Protect yourself & your data.

Sign-up for a VPN service and never worry again! Register now, and get our 7-day money back guarantee.

Are You At Risk For Facebook Hacking?

Screen Shot 2014-06-02 at 12.06.52 PMDo you know if you’re at risk of having your Facebook account hacked?

If you’re like most people, you probably don’t really give Facebook hackers much thought as you peruse friends’ photos, post updates, and scroll through your Newsfeed. But, the truth is, social media hacking is a lot more common than you might think! And, if you’re not taking some basic precautions, you might be putting yourself at risk, too.

In 2011, 1 in 10 social network users reported that their accounts had been hacked, and in 2012 the frequency increased to 1 in 6. (Source: Norton Cybercrime Report 2011, 2012.)

In order to protect yourself, your accounts, and your personal, private information, here are 7 simple techniques that you can use to ensure that your Facebook account does not fall prey to hackers.

1. Never share your login or password information.

This may seem like a given, but you’d be surprised how many people freely share their logins and passwords with friends and family members. Though your family and friends likely have your best interest at heart, they may unknowingly post, share or communicate information about your account that could put you at greater risk.

2. Create passwords that are LONG and STRONG.

If you use the same easy-t0-remember password for all your accounts, this is a big no-no. It’s recommended that you change your password every few months and create passwords that are both LONG and STRONG. A great way to do this is to use an acronym of your favorite song title or lyrics. For example, if you’re a Billy Joel fan, you could transform some lyrics from his 1976 hit, “New York State of Mind”, into a great password such as ImInaNYSofM1976 — no one’s going to guess that!

3. Don’t click Newsfeed links.

Never click on suspicious looking links to games, apps and other ads that you’re unsure of that may pop-up in your Facebook Newsfeed, and avoid allowing 3rd party applications to access your information when you sign-up for something.

4. Add a second email.

In the “General Settings” section of your Facebook account, had a secondary email in case your account is ever hacked. In the event that your account is compromised, Facebook will send recovery info to both email accounts so you have a better chance of recovering your information quickly and restoring your account security.

5. Only “friend” friends.

Only accept and extend friendship to individual that you actually know. When you accept a stranger’s friend request, you give them access to your personal information, so it’s always best to never post any sensitive, personal or financial details about yourself.

6. Follow Facebook’s advice.

Facebook offers step-by-step instructions that you can follow that outline “How to Prevent Your Facebook Account from being Hacked”. They suggest enabling login notification, checking your active sessions, and enabling secure browsing. Learn how to do all 3 here.

7. Beef up your online security.

Using a VPN (Virtual Private Network) is a fantastic way to beef up your online security in general and will sure-up not only your social media accounts but all your online activity including emailing, browsing and accessing sensitive sites like banking or credit cards.

A VPN is kind of like a secure tunnel that contains all your data and info, and the tunnel is comprised of an encryption ring that hackers cannot decipher, meaning everything that flows through the tunnel, including your social media activity, is safe.

VPN’s are also extremely valuable if you routinely access your social accounts from low-security networks like coffee shops, airports, hotels, restaurants, or any other public WiFi hotspot.

For a risk-free 7-day trial of GhostPath’s premier VPN service, click here.

Summer Internet Safety Guidelines For Kids

Screen Shot 2014-06-30 at 10.57.27 AMYour kids are home and enjoying summer vacation, and that means they’re likely spending many more hours plugged into digital devices and online.

And, though the internet can offer countless entertaining, social and even educational opportunities, it can also be a menacing place for children of all ages. Without guidelines and supervision, your children could be exposed to cyberbullying, inappropriate or hateful content, and many other dangers.

That’s why preserving open communication and setting up usage guidelines are so very important.

If you’re wondering how to best protect your kids from online dangers this summer, here are 7 tips to help you!

  1. Enjoy offline family time every day. Every day include some activities that do not revolve around the computer, TV, or any other digital device. Plan a day trip to an amusement park, enjoy a picnic, play a game of catch, or work on a craft project together.
  2. Set a good example. Whether at home or on vacation, set a good example for your kids. Don’t constantly check your emails or messages, put the phone away at the dinner table, and “unplug” often. Your kids will mirror your behavior.
  3. Centrally locate the computer. Putting the computer is a central location in your home is a great way to monitor your kids’ online habits. Also, outline if children are allowed to take smartphones and tablets into their bedrooms or if all “screens have to be seen”.
  4. Establish usage guidelines. Define the rules early and be consistent. Set a time limit for phone and internet usage, define what is acceptable behavior and what is not, and teach them privacy rules.
  5. Have open conversations. Discuss with your children the meaning of privacy and what is and isn’t appropriate to share online. Also, talk to them about online threats so that they begin to understand why having guidelines for internet usage are important in the first place.
  6. Offer alternatives. Suggest that your kids take part in activities outside of the house, like summer camp, sports, or arts & crafts. This not only will keep them offline, but it will provide them with mental and social stimulation.
  7. Put it in writing! Click HERE to download the Common Sense Media Agreement create by Time Warner. This contract includes 3 sets of checklists for kids of various ages as well as conversation guides for parents. If you want to establish healthy online boundaries with your children, this media agreement is a great resource.

Protect your family’s online privacy with GhostPath’s VPN service.
To try it out, click here & enjoy our 7-day money back guarantee!

Watch Out! Do Not Fall For World Cup Scams

Screen Shot 2014-06-24 at 10.43.45 AMHackers and scammers capitalize on big events — and the FIFA World Cup is no exception.

And, as you would expect, there are a number of scams out there aimed at World Cup fans.

These scammers are hoping that eager soccer enthusiasts will let their guard down enough so that they can get their money, access their data, and steal their identities.

But, being vigilant goes a long way!

Here are some ways these World Cup scam artists try to trick you:

#1 Free Prizes & Tickets

Anytime you get an email promising free World Cup tickets — or free anything — from someone you don’t know, you should be on high alert. One of the more common free ticket scams encourages people to click a downloadable zip file which then unleashes a virus that enables your computer to be taken over by a remote administration tool (RAT). Others ask you to click a link or fill out a questionnaire with your personal information.

#2 News & Highlights Reels

Breaking news and World Cup highlight reels are being used to entice recipients to open malicious attachments and downloads. Again, be on high alert should you receive an email which encourages you to click or download something in order to access info about the cup.

#3 Free Online Streaming

These scams show up not only in your inbox but on social media sites as well. Often these scams will ask you to complete a survey or download & install software. Again, be cautious & use your head! If something sounds too good to be true, it likely is.

(There are ways to safely and securely live stream all the FIFA World Cup action online. Read more about that HERE.)

 

Cryptolocker Virus: Hackers Hold Your Computer Hostage

There’s a new form of hacking out there that you may not have heard of, but experts are saying it’s the worst kind of virus out there: it’s complicated, has affected hundreds of thousands of victims, and has cost the victims tens of millions in “ransom” paid to hackers.

Recently exposed on The Today Show, this virus known as “cryptolocker” disguises itself as an attachment in an email from a familiar source, like UPS or FedEx, but when you click on the attachment, it launches the virus and attacks your hard drive. Your screen turns red, a countdown clock appears and all your data is locked…until you pay the hackers’ requested ransom.  And, the kicker is, the longer you wait, the more expensive it gets, and if you choose not to pay up, your data — family photos, sensitive files, music, medical records, etc. — are locked forever.

This sophisticated virus has been linked to a Russian crime ring.  The crime ring’s servers have now been disabled, but unfortunately there are a number of copycat hackers out there hoping to hold your computer for ransom, too!

The best way to protect yourself and your data is to (1) back up your computer regularly, (2) use antivirus software, (3) use extreme caution when opening unknown or unfamiliar emails and attachments, and (4) consider encrypting your data with a VPN service so that hackers can’t seize control.

Watch The Today Show‘s full report on the cryptolocker virus below.

Protect yourself from hackers with your own personal Virtual Private Network.
Read more about about how a VPN can protect you from cybercriminals here.

How To Watch The 2014 FIFA World Cup Online

Watch the World Cup Online

One of the world’s greatest sporting events — The FIFA World Cup — is underway, and many of you us want to watch it online.

But how? 

Fortunately, in 2014, it’s easier than ever to cut-the-cord, and watch all the World Cup games online.

And, we’ve made it extra easy for you to do away with cable with this flow chart (below) that you can follow.

World Cup Flow Chart for Cord Cutters
click for full-size

Flowchart for Watching World Cup Online

IMPORTANT: If you’re watching the cup using either ITV in the UK or CBC in Canada, then you’ll need to use Ghost Path to connect through one of those countries. Why? Because both ITV and CBC have geographic restrictions in place, so you need to be connected through their respective home countries to be able to use the service. But, Ghost Path enables you to bypass those restrictions so you never miss a game!

Ghost Path’s VPN service is just $10/month (or $5 a week), and you get instant access.  Click here to start watching the World Cup online now!

How to Break Through the Great Firewall of China

Screen Shot 2014-05-28 at 11.45.59 AMChina has the largest number of people connected to the internet — more than 600 million in fact.

Yet, despite the prolific use of the internet in one of the world’s biggest economies, freedom of information is hard to come by thanks to the communist government’s attempts to block all information that it considers to be politically incorrect or anti-cultural.

This makes it a real challenge for business people and travelers to access common and popular websites like Facebook and Twitter, as well as many others that people access on a daily basis.

These sites are blocked because the Chinese government simply can’t control how people exchange information on them. The censorship tool that China uses is widely known by the nickname “The Great Firewall of China”, or the Golden Shield Project.

In today’s post, we want to offer you some resourceful tips that will enable you to break through this censorship wall so you can access your favorite websites if you plan to visit or currently reside in China.

A VPN, or Virtual Private Network, allows you to circumvent these blocks by encrypting your data and sending it through secure virtual tunnels so that you can access social media sites as well as location-specific sites such as Netflix. Even better, most VPN services extend coverage to various electronic devices such as your laptop and Smartphone.

But first, let’s delve into the tactics that The Great Firewall of China uses block websites:

  • IP blocking
  • DNS filtering and redirection
  • URL filtering
  • Packet filtering
  • Connection reset

The cool thing is, with a VPN service, you get protection from all these tactics because the service hides your IP address and data, giving you the needed security to access the internet without compromising your access or privacy.

Once you sign up for a Virtual Private Network, you will have to choose your subscription plan depending on how long you will need the service. You can even choose a free service or one with a money-back guarantee to ensure you like it before you commit!

Here’s a step by step guide on how to get your preferred VPN up and running:

  1. After signing up for your preferred subscription method, download the VPN client onto your desktop or phone and install it. This typically takes a couple of minutes.
  2. Sign in via the VPN client user interface using your username and password. (These will be emailed to you once your subscription is active.)
  3. Log in and connect to a server of your choice.
  4. That’s it! Now, you’re all set to surf anonymously and with maximum privacy!

Most VPN services stay secure even in the event of a connection drop, meaning that you have that peace of mind knowing that you’re covered at all times.

With the help of a VPN service provider, you can easily bypass “The Great Firewall of China” and enjoy unlimited access to all your favorite and necessary websites!

To learn more about VPN services or to try it out for yourself, click HERE.

 

12 Tips for Internet Safety While Traveling

Screen Shot 2014-05-19 at 12.28.12 PMWhen we travel it’s often to “get away from it all”, yet we still like to be connected.

And, today, it’s getting easier and easier to stay plugged in no matter where you go thanks to the prolific number of networks that are available to us at coffee shops, airports, hotels, parks, cultural sites, restaurants and more!

But, when you travel, you’re even more at risk for online hacking because you’re often using a public or unsecured WiFi network to get online.

And, if you think just because you’re paying to use a connection or because it’s password protected that you’re safe, think again: “According to Marian Merritt, Internet safety advocate at Norton by Symantec (maker of Norton AntiVirus), the two main risks you face when using a hot spot are having someone track your online movements via the network you’re logged on to or trick you into using a “fake” hot spot, either by offering it up for free or mimicking the name of a legitimate one. In both instances, a hacker can potentially see your passwords, e-mail, social networks, bank accounts, documents, and more.” (Source: Travel & Leisure) Yikes!

The truth is, staying safe while traveling starts at home, well before the vacation begins!

If you’re wondering how to keep your devices, information and data secure even while traveling, we’ve got 12 tips for you.

Before Traveling…

  1. Back-up all your devices.
  2. Create temporary travel passwords, and make sure they’re strong and long.
  3. Turn on your computer’s firewall.
  4. Invest in a VPN (Virtual Private Network) to encrypt your communications and reroute all traffic through a private, secure connection.
  5. Don’t change the security settings on your phone. Generally your phone’s default settings are relatively secure.
  6. Turn off autofill and cookies. If your laptop or phone automatically enters your login info for familiar websites, be sure to turn that off before you travel.
  7. Handle all bank transactions from home, before you leave.

When traveling…

  1. Only connect using encrypted WiFi networks or a hard-wired connection, unless you have your own WiFi hotspot or use a VPN service.
  2. Never use public computers for logging into private accounts like email, Facebook, credit cards, or any other site that has access to your personal info.
  3. Switch off your phone’s wireless connection when you’re not using it.
  4. Cellular networks tend to be secure, so instead of suffering obscene roaming charges, purchase a data plan. Both Verizon and AT&T offer affordable global data roaming packages.
  5. Always use a site’s https address if available — https connections are safer and more secure than standard http.

How To Surf The Web Anonymously

Screen Shot 2014-05-08 at 3.01.18 PM

Have you heard that nearly everything you do or create on the Internet gets recorded somewhere, somehow?

Meaning that for every blog post you write and every photo you share, there’s a copy of it somewhere on the Internet. It doesn’t matter if you erase it, a copy will still be there for people to find. Not to mention the fact that our searches, sites we visit and other activities are tracked, too.

But what is more unsettling is that even if you just visit a particular Web site, you are often unknowingly giving out your personal information, such as your current location, what device you are using, and even where you go to after that. Kind of creepy, right?

Well, it gets worse…depending on where you live, this data may then be collected, sorted, analyzed, and even accessed and used by the government and other parties.

But, don’t worry — there is something you can do about it!

There are now Web services that allow you to browse anonymously. These services essentially act as the middle man between you and the Web site that you want to visit. This means that the Web site will not gain access to your private, personal information.

You have to remember, though, that while the destination Web site will not see your personal information, the “anonymizer” service, itself, may be keeping server logs that could record your data…and these logs could be subpoenaed. So, be sure to look for an anonymizer service that does not keep logs!

If you’re worried about protecting yourself and your data online, we’re here with some helpful solutions.  Read on to learn how to surf the Web anonymously.

Disable any extensions

Anonymous browsing services will protect you from people who have physical access to your computer. This means it will not leave anything about your history, and it will delete any cookies and private data when you close the browsers. Google, for example, has the Incognito mode for Chrome browsers.

However, there’s one more reason for you to use Incognito and other browser’s anonymous browsing mode: it disables any plugin or extension by default. Plugins and extensions can store private data and share these with the Web sites you visit without you even realizing it!

Without plugins or extensions running, you can be sure that Web sites cannot obtain data from them.

Get a second browser

Chrome, Firefox, Internet Explorer, Safari and other well-known browsers are available for free. Even if you have a favorite browser for your daily activities, it makes a great deal of sense to use a second browser for sites that you want to visit anonymously.

By second browser, we mean a browser that you do not use to open e-mails, access your social media accounts, and do your online shopping, among other usual activities online.

Why?

Because some anonymizer services – which may include those of your favorite browser – could still leave cookies on your machine, which could be used to find out who you are.

Use a Web proxy

If you only wish to anonymize select activities (and if you do not mind the slow speeds), you might want to check out Web proxies.

All you need to do is go to a Web proxy site, enter the URL you want to visit, and voila! You’re there…anonymously!

Be reminded, however, that some content may not display when you use a Web proxy. Forms may also not get submitted, such as when you are logging into your Web mail service.

A better option would be to use manual proxy servers that work like a Web proxy, but in this case, you will need to set your browser to use the proxy’s IP address.

Do not login

You’ve probably noticed that today there are countless sites that require you to use (or create) a username and password in order to read a complete article or use other functionalities of the Web site. Or, perhaps, they ask you to connect to the site using Facebook or Twitter.

Why?

Because the site wants identifying information about you.

Think twice before logging in or registering on any site with which you’re unfamiliar.

Don’t want to create a username & password, but still want access to the site?

Check out BugMeNot.com to see if they have log-in credentials that you can use instead.

Use TOR

TOR is short for The Onion Router.

What it does is simple: your browser will be performing the same data requests, but it will pass through a series of TOR servers, and at each of these transmissions, your data will be encrypted. This way you can access all your favorite sites without being “followed”!

Get a VPN

VPN stands for Virtual Private Network. These networks enable you to browse anonymously by hiding your IP address and replacing it with that of another server.

When you use a VPN you can rest assured that your data is secure and safe from hackers, cyber scams, identity theft and phishing email fraud.