Atlas VPN blog

Your daily reads on everything digital



Brute force attacks can crack your passwords

A brute force attack is one of the oldest, most popular and successful hacking techniques in the cyber world. This password-cracking method…

PRIVACY | 3 min Read

Honeypots give crooks a taste of their own medicine

Honeypot is a high-risk, high-reward type of situation. Dedicated specialists design a vulnerable system and place it on a silver platter…

PRIVACY | 3 min Read

End-to-end encryption and private messaging

End-to-end encryption (E2EE) is a privacy-oriented technology, alleviating the common fears about government and other third-party…

PRIVACY | 4 min Read

Top 10 VPNs had 31 million installs YTD, generating $23M in revenue

According to data analyzed by Atlas VPN, 10 best-known VPN applications hit 31 million mobile downloads in total during the first five months of 2020. At the same time, these VPN services generated 23 million dollars through in-app purchases.

REPORTS | 3 min Read

SPI firewall for more sophisticated protection

SPI (stateful packet inspection) firewall is a sophisticated variant of the traditional firewall. It is an advanced security mechanism…

PRIVACY | 3 min Read

US government to spend over $18 billion on cybersecurity

According to Atlas VPN investigation, the US government is set to allocate $18.78 billion for cybersecurity spending in 2021. The Department of Defense (DOD) requested the most funding for cybersecurity purposes by far, with $9.85 billion.

REPORTS | 3 min Read

What is vishing? Tips for spotting and stopping it

Vishing (or voice call phishing) can affect anyone who owns a phone. Similar to other types of phishing, vishing heavily relies on social…

PRIVACY | 3 min Read

Cross-site scripting vulnerabilities and risks they pose

Cross-site scripting (or XSS) is a sneaky invasion that turns benign and reliable websites into malware transmitters. Typically, hackers…

PRIVACY | 4 min Read

How to recognize scareware and its alarming tactics

Scareware is one of the sneakiest methods to prey on unwitting users. With bogus alerts and rogue programs, threat actors manipulate people…

PRIVACY | 3 min Read