Atlas VPN blog

Your daily reads on everything digital

Fake VPNs on the rise, dangers and bogus offers

VPNs have a solid reputation as the protectors of users’ privacy. While media coverage usually shows their bright side, this technology has…

PRIVACY | 4 min Read

Cyber incidents at NASA surged by 366%

According to data extracted and analyzed by Atlas VPN, cyber incidents at NASA increased by 366% in 2019. Being one of the nation’s most important federal agencies, this is an alarming finding.

REPORTS | 3 min Read

What is endpoint security?

Endpoint security is a practice of protecting computing devices that are vulnerable to cyber attacks or other malicious acts. Today, threats…

PRIVACY | 2 min Read

Deep packet inspection role in censorship and security

Deep packet inspection is a double-edged sword. While some label its application as intrusive, others claim that it offers a variety of…

PRIVACY | 4 min Read

How to clear your browser cache?

Browser cache is the technology that downloads and stores website components for faster web processing and viewing in the future. It makes…

HOW-TO | 4 min Read

Principles of social engineering and how it works

Social engineering refers to the manipulative strategies that convince people to perform a specific action. Differently than other threats…

PRIVACY | 5 min Read

87 million credential stuffing attacks target US daily

According to Atlas VPN investigation, hackers carry out 87 million credential stuffing attacks on US citizens daily. Credential stuffing is a cyber-attack where fraudsters use large numbers of stolen credentials to log into individuals’ or companies’ accounts.

REPORTS | 3 min Read

Basic VPN Tests and Checks to Run

While VPN tests deliver meaningful and insightful results, most users might be reluctant to perform them. Truth be told, a VPN is not always…

PRIVACY | 5 min Read

What is a whaling attack and how to prevent it?

A whaling attack is one of the most common cyber threats today. Even though whaling is similar to phishing, the target list is far more…

PRIVACY | 3 min Read