Atlas VPN blog
Your daily reads on everything digital
Explaining rainbow table attack threat to passwords
A rainbow table attack is an attempt to crack passwords hashed in databases. Apps and services do not store passwords in plaintext. Instead…
Apple overtook Samsung with the most smartphone users
In today's world, smartphones have become essential to our daily lives. From checking emails to browsing social media, we rely on these devices for communication, entertainment, and information.
These countries spend the most time online
There’s no doubt that we spend a significant time of our day online. Read on to explore internet usage trends across the world.
Employee Spotlight: Front-end Tech Lead Edvinas Beniušis
Welcome back to another edition of Employee Spotlight, where we interview the talented professionals who make Atlas VPN a success. Today, we are pleased to present Edvinas Beniušis, Atlas VPN's Front-end Tech Lead
Russia-backed hackers target government and IT organizations in Ukraine
Data presented by Atlas VPN reveals that Russian hackers have been targeting Ukraine’s and its allied countries’ government and IT organizations with ever-increasing sophistication.
Over 40% of people believe AI will replace their job
The rise of artificial intelligence (AI) has sparked both excitement and fear in the workforce.
Survey: 92% of organizations fell victim to phishing in the past 12 months
Organizations are still facing a substantial risk from phishing attacks. In the last 12 months, phishing incidents affected 92% of organizations.
Queen Elizabeth and Taylor Swift among most used passwords in 2022
The most commonly used credentials also change year-by-year and reflect the hottest topics.
13 common Instagram scams to know
Instagram scams are attempts to steal users’ personal information or money. Fake accounts send messages containing suspicious links, get…
Google, Fedora Project, and Microsoft products had the most vulnerabilities in 2022
Many programs have significant vulnerabilities that cybercriminals could exploit to steal personal information or launch attacks.