Atlas VPN blog

Your daily reads on everything digital



China forces gamers to abandon nicknames for real names

The gaming community in China will soon face a tremendous lifestyle change. The Chinese government will require players to sign up using…

PRIVACY | 3 min Read

Debunking myths on RDP and VPN: how do they differ?

Besides the technical jargon involved, RDP (Remote Desktop Protocol) represents a relatively simple concept of accessing computers remotely…

PRIVACY | 4 min Read

Guide on Virtual Network Computing (VNC) for remote control

Virtual Network Computing (VNC) is one of the most sophisticated remote access systems. In short, it allows you to control a computer from a…

PRIVACY | 2 min Read

How a transparent proxy regulates your browsing

A transparent proxy operates differently than a conventional proxy server. The traditional intermediary is a gateway that facilitates…

PRIVACY | 3 min Read

Is hotel Wi-Fi safe?

Free hotel Wi-Fi is an amenity that guests expect to have during their stays. Besides comfortable accommodations, locations, and sightseeing…

PRIVACY | 4 min Read

DNS hijacking: the art of directing users into fake sites

DNS hijacking alters the authentic destinations of DNS requests to lead users into rogue websites. Strikingly similar to their original…

PRIVACY | 4 min Read

Stalkerware or how your loved ones can spy on you

Stalkerware is one of the stealthy and invasive forms of malware. Surprisingly, it’s a commercially available software, but with a sinister…

PRIVACY | 3 min Read

Account takeover with SIM swapping and defenses against it

SIM swapping is an infuriating attack, involving deceit and call center employees. Con artists contact mobile providers and use convincing…

PRIVACY | 4 min Read

Is Gmail encryption enough to protect your emails?

Gmail encryption stands between hackers and your email messages. Even if you engage in such exchanges only occasionally, you should know how…

PRIVACY | 4 min Read