Atlas VPN blog

Your daily reads on everything digital



The invisible rootkit threat and its mitigation

A rootkit is like a toolbox of the malware world. It’s a dangerous program that lets hackers gain control over computer systems without the…

PRIVACY | 3 min Read

A supercookie’s impact on browsing and its prevention

A supercookie might sound delicious, but it is not a treat in terms of digital privacy. For online businesses, traditional cookies are…

PRIVACY | 3 min Read

Three's a crowd: preventing a man-in-the-middle attack

A Man-in-the-Middle attack (MitM) is a cyber threat, with a name that perfectly defines its behavior. Between you and your final destination…

PRIVACY | 3 min Read

Brute force attacks can crack your passwords

A brute force attack is one of the oldest, most popular and successful hacking techniques in the cyber world. This password-cracking method…

PRIVACY | 3 min Read

Honeypots give crooks a taste of their own medicine

Honeypot is a high-risk, high-reward type of situation. Dedicated specialists design a vulnerable system and place it on a silver platter…

PRIVACY | 3 min Read

End-to-end encryption and private messaging

End-to-end encryption (E2EE) is a privacy-oriented technology, alleviating the common fears about government and other third-party…

PRIVACY | 4 min Read

SPI firewall for more sophisticated protection

SPI (stateful packet inspection) firewall is a sophisticated variant of the traditional firewall. It is an advanced security mechanism…

PRIVACY | 3 min Read

What is vishing? Tips for spotting and stopping it

Vishing (or voice call phishing) can affect anyone who owns a phone. Similar to other types of phishing, vishing heavily relies on social…

PRIVACY | 3 min Read

Cross-site scripting vulnerabilities and risks they pose

Cross-site scripting (or XSS) is a sneaky invasion that turns benign and reliable websites into malware transmitters. Typically, hackers…

PRIVACY | 4 min Read