Private Communications Corp. Launches Video Optimization Service to Help Mobile Customers Squeeze the Most from their Plans and to Help MVNOs Pay Less to Carriers

Posted on Tuesday, March 19th, 2019 by Tom Von Lahndorff

NEW YORK, NY – (February 25, 2019) - Private Communications Corporation (PCC), the leading provider of Internet security and mobile optimization utilities for consumers, today has officially launched its Video Optimization service. PCC’s Video Optimization technology dramatically reduces the data consumed when users are watching videos on YouTube, Instagram, Facebook, as well as over 40% [ Read More → ]





Private Communications Partners with FreedomPop’s New UNREAL Mobile Spin Off

Posted on Friday, July 27th, 2018 by Tom Von Lahndorff

First mobile service to include free VPN privacy features, Data Compression And Ad Blocking Services SHERMAN CT and LOS ANGELES CA, July 27 2018  --  Private Communications Corporation, a leading provider of wholesale VPN and mobile optimization technology, today announced it has partnered with FreedomPop, the global telecom company that pioneered free wireless internet and [ Read More → ]





PRIVATE COMMUNICATIONS CORPORATION AND TRINITY MOBILE NETWORKS ANNOUNCE PARTNERSHIP TO PROVIDE SEAMLESS WIFI AND CELLULAR CONNECTIVITY TO WIRELESS OPERATORS AND CONSUMERS

Posted on Tuesday, July 17th, 2018 by Tom Von Lahndorff

FOR IMMEDIATE RELEASE  PRIVATE COMMUNICATIONS CORPORATION AND TRINITY MOBILE NETWORKS ANNOUNCE PARTNERSHIP TO PROVIDE SEAMLESS WIFI AND CELLULAR CONNECTIVITY TO WIRELESS OPERATORS AND CONSUMERS Partnership leveraging PCC’s global networking infrastructure and Trinity’s unique Software Defined Wireless Network enables enterprises, fleet owners and MVNOs to access the benefits of virtualizing wireless networks for the first time  NEW [ Read More → ]





Private Communications Corporation Unveils DataCompress, Reduces Mobile Data Consumption by up to 50%

Posted on Friday, April 1st, 2016 by Tom Von Lahndorff

NEW YORK, NY -- (April 1st, 2016) – Private Communications Corporation (PCC), the leading provider of Internet security and mobile optimization utilities for consumers, today has officially launched its data compression product, DataCompress. Both Android and iOS users across the world can now download the application from the Google Play Store or iTunes to cut [ Read More → ]





Private WiFi Proudly Announces the Release of Version 2.0

Posted on Tuesday, March 1st, 2016 by Tom Von Lahndorff

Private WiFi, a leading and innovative company in the VPN software market, is proud to announce the release of a new version of its flagship product. V2.0 has been completely redesigned and has a number of great new features which enhance the user experience. A simplified user experience with enhanced product features: V2.0 has a [ Read More → ]





Private WiFi Issued Patent for Cutting Edge VPN Technology

Posted on Monday, December 14th, 2015 by Jared Howe

NEW YORK, NY--(Dec 14, 2015) Private WiFi announced today the issuance to it by the US Patent Office of a patent that automatically turns on VPN protection when a mobile user switches to an unsecure WiFi connection, and automatically turns on data compression when a user switches to a cellular connection. Private WiFi is the [ Read More → ]





Protecting Your Identity with the Internet of Things

Posted on Thursday, May 21st, 2015 by
Internet of Things

The internet of things—or IOT, as it’s commonly known—was once the stuff of science fiction, a newfangled “wave of the future” concept only experienced at futuristic demonstrations like the World’s Fair. But now many of these devices are already in use in millions of households around the world. They’ve become an interesting yet somehow still unknown entity in the world of technology, and industry experts have stated these products will be the norm just a handful of years from now.

Tags:Hacking Threats, Wifi hacking, WiFi Trends,



Avira Offers Private WiFi’s VPN As Part of New Bundle

Posted on Thursday, May 14th, 2015 by
Avira

Germany-based security company, Avira, just announced the release of a new bundled product which includes both their Antivirus Pro and Private WiFi.  This bundle protects users from both malware infection and data theft.

Tags:data protection, encryption, vpns,



How To: BlueKai, Online Tracking, and Your Privacy

Posted on Tuesday, May 5th, 2015 by
online-tracking

BlueKai is an online marketing firm that provides data to marketers, ad networks and publishers. This data is used to target ads to consumers. This information that BlueKai gathers is considered "anonymous" because it identifies web browsers, not individuals. However, because they gather data from multiple sources, it's easy for them to build a very [ Read More → ]

Tags:online privacy,



How To: Safari Privacy and Security Settings

Posted on Tuesday, May 5th, 2015 by
Safaris

To edit the security settings for Safari: Go to Safari > Preferences. Click the AutoFill tab. On this tab, select what types of forms your browser fills in automatically. Note: In general, you should remove all the checkboxes from this tab. If someone gains access to your machine, or the AutoFill data files, then the [ Read More → ]

Tags:data protection, online privacy,



How To: Internet Explorer Privacy and Security Settings

Posted on Tuesday, May 5th, 2015 by
internet-explorers

Internet Explorer has security measures in place to help protect you as you browse the web. Follow these steps to adjust these settings: Within Internet Explorer, go to Tools > Internet Options. The Internet Options window appears. Select the Security tab. This tab has a section at the top that lists the various security zones [ Read More → ]

Tags:data protection, online privacy,



How To: Managing Your iPhone Security

Posted on Tuesday, May 5th, 2015 by
iPhone

Smartphones, like the iPhone, have become increasingly important to our modern lives, and accessing account and professional content is shifting more towards mobile devices. The iPhone has security options that you can use, which are listed below. Use a Passcode Make sure that you are using a passcode onto your iPhone, which is the easiest [ Read More → ]

Tags:data protection, online privacy,



Online Dating and Pubic WiFi: How Secure Is It?

Posted on Tuesday, May 5th, 2015 by
online dating

You never want to share sensitive information like online banking accounts or credit card portals over unsecured public web connections, but the truth is online dating profiles can often contain just as much data as either of those. In fact, your online dating profile—if falling into the hands of a hacker—can cause far more personal safety problems than your banking data. After all, with online banking a thief just gains access to your checking account; with online dating data, a criminal could gain access to your home address, your workplace, any children’s or family members’ names, and more.

Tags:data protection, online privacy, wifi hotspots,



How To: Managing Browser Cookies

Posted on Tuesday, May 5th, 2015 by
cookiess

A cookie is a small piece of text stored on your computer by a web browser. A cookie can be used for authentication, storing site preferences, shopping cart contents, the identifier for a server-based session, or anything else that can be accomplished through storing text data. A cookie consists of one or more name-value pairs [ Read More → ]

Tags:data protection, online privacy,



How To: Installing Patches and Automating Updates

Posted on Tuesday, May 5th, 2015 by
patchs

Patches are software that fix problems or issues with a computer program. This includes fixing security vulnerabilities and other bugs, and improving the usability or performance. Most software, browsers, and operating systems have features that allow them to be updated automatically when connected to the Internet. When an Internet connection is established, these programs prompt [ Read More → ]

Tags:data protection,



How To: Configuring Your Firewall for Optimal Security

Posted on Tuesday, May 5th, 2015 by
firewalls

Firewall software is a group of security protocols designed to keep malicious code and hackers out of your computer. A firewall protects your laptop from Internet traffic entering in or information leaking out. While antivirus software scans emails and files, a firewall acts as a guard dog, keeping your system safe from unauthorized entry. It [ Read More → ]

Tags:data protection,



How To: Job Search Sites and Your Privacy

Posted on Tuesday, May 5th, 2015 by
job-searchs

Make sure you protect your privacy while conducting an online job search. The following sections describe what steps you can take to ensure your privacy. 1. Don't include a lot of personal contact information (name, address, phone numbers) on your resume This might make it a little more difficult for an employer to reach you, [ Read More → ]

Tags:data protection, online privacy,



How To: File Sharing Best Practices

Posted on Tuesday, May 5th, 2015 by
file-sharings

File sharing is the process of sharing computer data or space in a computer network. It also can mean sharing files in a network. File sharing allows people to use the same file or files. P2P (Peer 2 Peer) software allows users to share files via the Internet. After P2P software is installed, computers are [ Read More → ]

Tags:data protection,



How To: Lotame, Online Tracking, and Your Privacy

Posted on Tuesday, May 5th, 2015 by
online-tracking

Lotame is a behavior targeter focused on social networks, like Facebook. The information that Lotame and other similar companies gather is considered anonymous because it identifies web browsers, not individuals. However, aggregating data from multiple sources means companies can easily create a detailed profile of a user that many privacy experts believe can actually identify [ Read More → ]

Tags:online privacy,



How To: eXelate, Online Tracking, and Your Privacy

Posted on Tuesday, May 5th, 2015 by
online-tracking

eXelate Media is a company that collects and sells web data on consumers. EXelate has been criticized for linking web-surfing habits with personal data, since this crosses a major privacy line. eXelate gathers consumer data from hundreds of websites and can determine a consumer's demographic information and web habits using cookies. Though eXelate claims its [ Read More → ]

Tags:online privacy,



How To: Managing Your Android Security

Posted on Monday, May 4th, 2015 by
android-phones

Several popular Android apps regularly share your location and critical phone data such as your phone number with advertisers and others. The following sections contain tips you can use to keep the data in your Android smartphone out of the wrong hands. Permissions You can view the information that each app you've downloaded is able [ Read More → ]

Tags:data protection, online privacy,



How To: Managing Your Google and Gmail Security

Posted on Monday, May 4th, 2015 by
gmail-securitys

If you use Gmail you probably store a lot of important personal information in your account, such as photos, files, and calendar information. This article discusses the ways in which your account could be comprised, and lists some steps that you can take to help protect your account. Hacker Methods Hackers can get access to [ Read More → ]

Tags:data protection, online privacy,



How To: Online Dating Security

Posted on Monday, May 4th, 2015 by
online-datings

Online dating can be a great way to meet people outside of your normal social circle. However, it can also compromise your security if you are not careful. Below are some tips to make online dating safer. Be Safe Make sure that you only use reputable and reliable online dating services that prioritize its member’s [ Read More → ]

Tags:online privacy,



How To: Managing Your Email Security

Posted on Monday, May 4th, 2015 by
email-securitys

Most if not all of us use email as our primary means of communication. Unfortunately, email accounts are also highly vulnerable, so email security is an important issue for all of us. This article discusses some steps you can take to ensure that your email account is secure. Email Threats Below are some of the [ Read More → ]

Tags:data protection, online privacy,



How To: Opera Privacy and Security Settings

Posted on Monday, May 4th, 2015 by
opera2s

To manage your security settings in Opera, do the following: Go to Opera > Settings . The Settings window appears. Click Privacy & security on the left navigation panel. Click Manage certificates for an overview of your installed certificates. The Certificate Manager window appears. This window contains the following tabs: You can view, delete, import [ Read More → ]

Tags:data protection, online privacy,



How To: Foursquare Security Issues

Posted on Monday, May 4th, 2015 by
foursquares

All social networking websites reveal person information about ourselves. However, these risks are escalated when using Foursquare, a website which exists to tell our friends where we are. This article discusses some of the security issues you should be aware of if you use Foursquare. Its Risky to Broadcast Your Location If you use Foursquare [ Read More → ]

Tags:data protection, online privacy, social media privacy,



How To: GPS and Mobile Phone Privacy

Posted on Monday, May 4th, 2015 by

GPS stands for Global Positioning System. Mobile phone GPS tracking can prove useful in many walks of life and especially when an emergency arises. For these reasons, the FCC has instructed that wireless network providers provide the mobile phone GPS tracking location information for 911 calls which have been made by callers. However, because a [ Read More → ]

Tags:data protection, online privacy,



Tips to Protect Your Digital Identity

Posted on Wednesday, April 29th, 2015 by

Within the last decade, our senses of self and identity have made a major shift.  Whether we’ve noticed it or not, the items that used to define our identities have gone from hard copy items, such as birth certificates and Social Security cards, to online banking passwords, Facebook logins, and mobile wallets stored in our smartphones.  While we still need to safeguard and protect those hard copy documents, we also have to focus on our digital identities.

Tags:identity theft, mobile apps, social media privacy,



Why I Started Private Communications Corporation

Posted on Tuesday, April 28th, 2015 by
VPN

Kent Lawson, Founder and CEO of Private WiFi, talks about what inspired him to start the company. This is the first in a series of weekly CEO blog posts on this and other topics.

Tags:data protection, Hacking Threats, online privacy, vpns, wifi hotspots,



The Three Legs of Protection: Antivirus Software, Firewalls, and VPNs

Posted on Wednesday, April 15th, 2015 by
stool with three legs

We've all heard about antivirus software and firewalls. But we probably don’t know as much about the third leg of computer protection: a VPN, or virtual private network. In his latest article, company CEO Kent Lawson says we do this at our peril, because the damage we can suffer from not using a VPN may far outweigh the risks of the other two combined. After the large-scale hack attacks over the past few years, VPNs are now earning their spot as the third security leg that is vital to every-day computer security.

Tags:data protection, vpns,



New Hotel WiFi Vulnerability

Posted on Thursday, April 9th, 2015 by
vnkjeal-1024×386

Earlier this year, the FTC declared a critical announcement for travelers: hotel WiFi is dangerous. Many people assume that because they are paying for it the network must be safe, but that is a dangerous assumption. Hotel WiFi networks are completely insecure; the bad news is that a new exposure in hotel WiFi has just been found. Read more to find out how you can keep yourself protected.

Tags:data protection, Hacking Threats, network security, vpns, wireless security,



Private Communications Corporation Unveils DataCompress for Android, Reduces Mobile Data Consumption by up to 50%

Posted on Wednesday, April 1st, 2015 by

Private Communications Corporation (PCC), the leading provider of Internet security and mobile optimization utilities for consumers, today has officially launched its data compression product, DataCompress for Android. Android users across the world can now download the application from the Play Store to cut mobile data use by up to 50%*.





Introducing DataCompress: A Data Savings App for your Mobile Device

Posted on Wednesday, April 1st, 2015 by
twitter_feed

Is your phone a data hog? If so, we have some good news. The makers of Private WiFi, have a new product on the market to help users improve their Internet experience. With the launch of DataCompress, Android users can cut their mobile data use by up to 50%*. This new app let's you get the right-sized content, fast! This means using less of your plan as you get more value out of it.

Tags:Mobile App, Mobile Devices, WiFi Trends,



Cyber Security Training Just As Important at C-Level

Posted on Tuesday, March 24th, 2015 by
BYODCSuite

The need for better online safety training to prevent data breaches is a hot topic right now. Coupled with stronger computer and network policies, companies want to prevent the hacking events that leave businesses susceptible to a data breach. While it’s no secret that employees in both the private sector and government service can unintentionally expose organizations to hackers, what is surprising is a report by Wombat Security that shows that 33% of CEOs fell for phishing attacks that led to network access. Why are they falling for this kind of internet activity?

Tags:BYOD, data protection, identity theft, Mobile Devices, network security, wireless security,



E-filing: The Fastest and Safest Way to File Taxes?

Posted on Monday, March 9th, 2015 by
eflilingtaxes

E-filing your annual return to the IRS offers speed and convenience and when coupled with industry-approved software that can plug in the values for you, a lot of the headaches traditionally associated with doing your taxes are eliminated. However, there are some potential dangers that you should be aware of, such as insecure public WiFi networks and online tax fraud.

Tags:data protection, Hacking Threats, identity theft, online privacy,



FTC Says Hotel WiFi is Dangerous

Posted on Monday, February 23rd, 2015 by
shutterstock_221476462s

Recently, the FTC posted an article on their website stating that hotel WiFi is dangerous and that users should not assume that just because they pay for Internet access that their connection is secure.

We couldn’t agree more. In fact, I have been stating this fact since we launched Private WiFi nearly five years ago.  This is an important topic because hotel traveler’s rank WiFi access at hotels as the number one amenity that they look for when booking hotel rooms.

Tags:data protection, Hacking Threats, vpns, Wifi hacking, wireless security,



How Are You Celebrating Safer Internet Day 2015?

Posted on Monday, February 9th, 2015 by
safer-internet-calendar-2015-smalls

Safer Internet Day (SID), which falls on February 10th this year, helps promote safe and more responsible use of technology and mobile phones, especially for young children and teenagers.  This day of awareness and education gets more important every year because, for better or worse, the Internet is a part of our everyday lives.

Read on to get more involved.

Tags:Mobile Devices, online privacy,



Managing BYOD Security Threats: VPNs Mitigate The Risks

Posted on Wednesday, January 28th, 2015 by
BYODSuitcases

It’s clear that the era of BYOD is here to stay. Workers are no longer confined to an office desk and computer, and instead are able to do work from anywhere: home, their local coffee shop, and while taking public transportation. The proliferation of public wireless networks has made this possible, and while this has freed employees up to do work from nearly everywhere, it also has introduced many security challenges.

Tags:BYOD, data protection, Hacking Threats, Mobile Devices, network security, vpns, wireless security,



How To: Managing Your Xoom Security

Posted on Friday, January 23rd, 2015 by
xooms

Motorola’s Xoom tablet is a powerful tool, but it’s also a security risk. Below are some simple rules you can follow to make sure your Xoom security is kept at a high level. Lock Your Screen You can lock your screen so that no one else can access your data or buy applications without your [ Read More → ]

Tags:data protection, online privacy,



How To: Managing Your Google+ Security Settings

Posted on Friday, January 23rd, 2015 by
google-+s

Google+ is Google’s social networking site that is similar to Facebook. Below are some tips on how you can use Google+'s security and privacy options to make your Google+ experience a safe one. Turn Off Photo and Geolocation Tagging By default, Google+ inserts geolocation information into any photo you upload, and allows your face to [ Read More → ]

Tags:data protection, online privacy,



How To: Managing your iPad Security

Posted on Friday, January 23rd, 2015 by
ipads

The iPad is a fun and powerful tool, but it’s also a security risk. Below are some simple rules you can follow to make sure your iPad’s security is kept at a high level. Create a Passcode To set your iPad passcode, go to Settings > Passcode. Tap Turn Passcode On, and enter a passcode. [ Read More → ]

Tags:data protection, online privacy,



How To: Managing Your WordPress Site Security

Posted on Friday, January 23rd, 2015 by
wordpresss

This article contains a number of tips that should keep in mind to ensure that your WordPress site contains no security holes that might make it vulnerable to hackers. Use a Secure Password Creating a strong password is one of the best and easiest defenses against being hacked. Make sure you change it at least [ Read More → ]

Tags:data protection, online privacy,



How To: Managing Your Skype Security

Posted on Friday, January 23rd, 2015 by
skypes

This article discusses a number of simple steps you can take in order to stay safe when using Skype. Create Strong Passwords Choosing a secure password to access your Skype account is crucial. The following are some password tips: Use a mixture of letters, numbers and special characters. Use a unique password that is not [ Read More → ]

Tags:data protection, online privacy,



How To: Managing Your Kindle Security

Posted on Friday, January 23rd, 2015 by
kindles

While Amazon’s Kindle is a great product, it has very little security. Below are tips that you can use to make sure you password protect your Kindle, and don’t receive unwanted documents or charges to your Kindle account. Password Protecting Your Kindle You can set a password for your Kindle so no unauthorized users can [ Read More → ]

Tags:data protection, online privacy,



How To: Location Data and Mobile Phone Privacy

Posted on Friday, January 23rd, 2015 by
mobile-phones

GPS stands for Global Positioning System. Mobile phone GPS tracking is useful for certain things, such as for emergencies. As such, the FCC has instructed that wireless network providers provide the mobile phone GPS tracking location information for 911 calls which have been made by callers. However, because cell phones track where an individual goes [ Read More → ]

Tags:data protection, online privacy,



How To: Managing Your eBay Security

Posted on Friday, January 23rd, 2015 by
ebays

This article contains a number of steps that you can take to help protect your eBay account from identity theft and scams. Secure Passwords Secure passwords combine both letters and numbers. Be sure to use something that is not easily guessed and change your passwords at least every six months. Also, your eBay password should [ Read More → ]

Tags:data protection, online privacy,



How To: Managing Your Instagram Privacy Settings

Posted on Friday, January 23rd, 2015 by
instagrams

Instagram is a great app for sharing your photos with your friends. But you also want to make sure your photos are not shared with everyone, so personal information does not fall into the wrong hands. Below are some security tips you can follow when using Instagram. Managing the Privacy Setting of Your Feed When [ Read More → ]

Tags:data protection, online privacy, social media privacy,



How To: Managing Your PayPal Security

Posted on Friday, January 23rd, 2015 by
paypals

This article contains a number of steps that you can take to help protect your PayPal account from identity theft and scams. Accessing PayPal: Before accessing your PayPal account, also open a new web browser (such as Internet Explorer or Firefox), and type the following URL: https://www.paypal.com. This ensures that you safely and securely access [ Read More → ]

Tags:data protection, online privacy,



How To: Managing Your Pinterest Security

Posted on Friday, January 23rd, 2015 by
pinterests

This article contains some guidelines you should follow when using Pinterest. Pinterest is a social website that allows users to share photos and images. But you should be aware that it also collects personal information from you. What Pinterest Tracks Pinterest is very much like Facebook, in that it records your IP address and the [ Read More → ]

Tags:data protection, online privacy, social media privacy,



How To: Managing Your Facebook Security Settings

Posted on Friday, January 23rd, 2015 by
facebooks

Social networks like Facebook are open to phishing, malware and other unwanted problems. While there is no perfect solution, you can change your Facebook security settings to help increase your privacy and safety. Adjusting your Facebook Security Settings Unless you want the whole Facebook network world to see all your profile, photos and videos, it [ Read More → ]

Tags:data protection, online privacy, social media privacy,



How To: Managing Security Settings in Windows 8

Posted on Friday, January 23rd, 2015 by
windows-8s

Windows 8 has many new (as well as old) security features that you should know about. The three main security components are below: Check Security Windows SmartScreen Windows Defender Check Security According to Microsoft, Windows 8 is the most secure version of Windows so far, which many security experts agree with. You can view an [ Read More → ]

Tags:data protection,



Identity Protection: 5 Tips to Stay Mobile Secure in 2015

Posted on Thursday, January 8th, 2015 by
mobileidentitythefts

Living a mobile lifestyle does not come without risk, especially where your identity is concerned. But staying mobile secure doesn’t have to be complicated. Consider this: 94.2% of identity victims say they are still highly engaged online and via their mobile devices despite having had their personally identifiable information stolen, according to a recent study from The Identity Theft Resource Center.

So how do we stay safe? Just follow these five tips!

Tags:cybercrime, identity theft, mobile apps, Mobile Devices, passwords, vpns,



Don’t Get Hacked At CES

Posted on Friday, January 2nd, 2015 by
vegas-hacks

It’s that time of year again – when more than 150,000 gadget geeks, techies and businesses from around the world descend on Las Vegas for the mother of all trade shows – the International Consumer Electronics Show. With over 3,200 exhibitors previewing and showcasing their high tech products, CES is the perfect place for tech enthusiasts to network. So you’d think it would be safe for attendees to connect their laptops and mobile devices to the event’s public WiFi hotspot.  But you’d be wrong. Like most big events, CES can be a hot spot for hackers.  If you’re going to be there, make sure you don’t become a target.

Tags:Hacking Threats, Mobile Devices, network security, wifi hotspots, WiFi Trends, wireless security,



Don’t Give Your Data Away: Blur Your Passwords, Payments, and Privacy

Posted on Tuesday, November 25th, 2014 by
Blurs

Now is the time to make your online activity a blur. Why? Here are some startling reasons: In the last 18 month, over 157 million US credit card holders have been notified of a breach. Furthermore, the typical web surfer is tracked by 11 companies at each site they visit - resulting in over 2,500 unique tracking and data collection attempts weekly. This is the new reality of the Internet in 2014 – and as 2015 approaches, the treat level will only increase.

Tags:data protection, identity theft, Mobile Devices, Online Payments, online privacy, passwords, vpns,



Holiday Shopping Goes Mobile: Be Cyber Secure [INFOGRAPHIC]

Posted on Thursday, November 20th, 2014 by
HolidayGifts

As the holiday shopping bustle approaches, don't just think about buying the perfect gift and getting a great deal. For a happy and healthy season, remember that being cyber secure when you make your holiday purchases online is just as important!

This year Private WiFi has teamed up with the National Cyber Security Alliance to help consumers be safe online when using their mobile devices are they shop. Check out our infographic learn more about the the threats of holiday shopping on the go and follow our five tips for cyber secure shopping.

Tags:Authentication, cybercrime, data protection, Hacking Threats, Mobile Devices, Online Payments, passwords, vpns,



CNN Meets With Private WiFi to Understand Public WiFi Exploits, Privacy Dangers

Posted on Friday, October 31st, 2014 by
Screen-Shot-2014-10-31-at-3.10s

CNN International, arguably the world’s largest and most dominant cable news channel, sat down with Private WiFi this week to better understand the exploits and dangers on public WiFi networks.

CNN aired its "Walk in the Park" segment to showcase various hacking scenarios and the vulnerabilities of public WiFi – whether in a public park setting, hotel, airport, or similar location offering “free” WiFi.

Tags:cybercrime, data protection, Hacking Threats, Online Payments, Wifi hacking, wireless security,



ITRC Victim Impact Survey Findings LIVE Event

Posted on Thursday, October 23rd, 2014 by
identitythefthandprints

On Wednesday, October 29, learn about the ITRC's most recent survey report, “Identity Theft: The Aftermath.” A panel of experts will discuss the survey's key findings, with a special emphasis on the emotional impact of identity theft on victims, and ways in which the industry as a whole can leverage this information to better serve victims and consumers.

Can’t make it to the event in Washington, DC, but want to be involved? Join in live on Twitter and follow along with the hashtag #IDTheftImpact. Keep reading for more details about this very important event.

Tags:cybercrime, identity theft, online privacy,



Q&A: Founder of ‘Savvy Cyber Kids’ on Cybersecurity Best Practices

Posted on Tuesday, October 21st, 2014 by
Ben Halpert NCSAM

Because October is National Cyber Security Awareness Month, and in part to raise public awareness of the dangers of identity theft, we recently chatted with author and technology guru Ben Halpert. Several years ago he launched Savvy Cyber Kids, a nonprofit that has joined the U.S. Department of Homeland Security’s STOP.THINK.CONNECT. campaign's national network, forming a partnership that will promote cybersecurity awareness to children nationwide. Keep reading to learn why he launched Savvy Cyber Kids and various topics related to keeping kids as safe as possible online.

Tags:BYOD, identity theft, online privacy, wifi hotspots,



WiFi Footprint: Personal VPNs Endorsed as WiFi Hotspots and Autoconnect Functionality Proliferate

Posted on Tuesday, October 14th, 2014 by
Global WiFi Footprint

"WiFi footprint" is a simple term for a complex issue: the exploding pace of WiFi hotspot creation is not abating and soon a roamable, global alternative network will become our reality.

In a world seemingly saturated in WiFi, the notion of autoconnecting to these networks might seem appealing. However, whether using a laptop or mobile device, security threats remain a constant.

Tags:data protection, encryption, Mobile Devices, network security, vpns, WiFi Trends,



University of Maryland Professors to Study WiFi Hotspot Behavior

Posted on Monday, October 13th, 2014 by
computer-researchs

Two University of Maryland professors, David Maimon, an expert in online criminal behavior, and Jonathan Katz, the Maryland Cybersecurity Center director, recently received a $200,000 grant from the National Science Foundation to study how people access and use public WiFi hotspots.

Find out what the duo plans to do with the funds -- including looking into why some users may be assuming that it’s safe to access sensitive information on public WiFi hotspots at "upscale" places.

Tags:cybercrime, Hacking Threats, Wifi hacking, wifi hotspots, wireless security,



Experian Survey: We Understand WiFi Dangers but Don’t Protect Ourselves from Identity Theft

Posted on Monday, October 6th, 2014 by
WiFi Survey Experian

October is National Cyber Security Awareness Month, and in part to raise public awareness of the dangers of identity theft, Experian, a global information services company, has published a new survey regarding U.S. attitudes toward this serious problem. Check out the results -- including why so many people still fail to take actions to protect themselves online.

Tags:cybercrime, data protection, identity theft, passwords, vpns, Wifi hacking, wireless security,



NCSAM 2014: Private WiFi Champions the Cause of Cybersecurity

Posted on Wednesday, October 1st, 2014 by
NCSAM2014s

Today we celebrate the launch of National Cyber Security Awareness Month (NCSAM), a national public awareness campaign held each October to encourage everyone to protect their computers, tablets, and smartphones. Private WiFi is proud to support the great mission and outreach goals, and we're happy to return as a “champion” for the cause of cybersecurity. We’re excited to kick off the month by participating in the first #ChatSTC on Twitter this Thursday, October 2 at 3pm ET.

Keep reading for more details on NCSAM activities as well as how you can join in on the Twitter chat on Thursday!

Tags:data protection, online privacy, wireless security,



Canadian Transit Systems to Get Free WiFi

Posted on Tuesday, September 30th, 2014 by
Telus-Wifi-Bus-Photo-2s

You would think Canadians would be a little wary of using public WiFi after a spy agency was accused of using airport WiFi networks to track travelers. But Canadian cities are rapidly installing free public WiFi on their transit systems, including three Metro Vancouver buses that began offering free WiFi earlier this month. Keep reading to find out where else this convenience is expanding (and how to protect your online privacy!).

Tags:cybercrime, Hacking Threats, network security, online privacy, Wifi hacking, wireless security,



Are Phone Calls Over WiFi Hotspots Safe from Hackers?

Posted on Monday, September 29th, 2014 by
WiFi Calling Mobile

You might have heard that the new iPhone 6 supports making phone calls over WiFi networks. Using WiFi networks to make calls is the next big thing for mobile phones.

But how safe is it to make phone calls using public WiFi hotspots? Are your calls being encrypted? And should you take any steps to protect yourself from WiFi hackers? Read on to find out more.

Tags:Hacking Threats, mobile apps, Mobile Devices, vpns, WiFi Trends, wireless security,



How Hackers Protect Themselves When Using Public WiFi

Posted on Wednesday, September 24th, 2014 by
hacker-WiFis

Every year, thousands of hackers and security experts descend on Las Vegas for two of the world's largest annual hacker conventions: Defcon and Black Hat. Security researchers present their latest findings and security exploits.

Keep reading to find out what types of hacking they are doing at these events and ways to protect yourself!

Tags:cybercrime, data protection, encryption, network security, vpns, wifi hotspots,



Private WiFi on Good Morning America: “The Hazards of Public WiFi”

Posted on Monday, September 22nd, 2014 by
Screen-Shot-2014-09-22-at-5.18s

A recent Good Morning American segment featuring Private WiFi begins with a startling truth: "Everyone is at risk; public WiFi can leave your most private information wide open." While these public hotspots are widespread and convenient, the free connection comes at a hidden price.

Tags:cybercrime, Hacking Threats, vpns, Wifi hacking, wifi hotspots,



The Rise of the Evil Twin: How a Personal VPN Can Strike Back

Posted on Monday, September 22nd, 2014 by
eviltwin_hackers

We applaud Tech Republic for explaining what we've been educating about for years: "Public hotspots all have one thing in common; they are open networks that are vulnerable to attacks and security breaches. Most, if not all, public hotspots do not encrypt data, allowing passwords, email messages, and other information to be intercepted by nefarious types.”

Keep reading to see what else their article suggests -- as well as our suggestions for avoiding evil-twin hotspots, dodging hackers, and protecting your identity.

Tags:encryption, Hacking Threats, identity theft, network security, vpns, wifi hotspots,



Infographic: Protecting Yourself and Your Mobile Device

Posted on Friday, September 19th, 2014 by
Screen-Shot-2014-09-15-at-1.11s

While most people secure their laptops with the latest security updates, there's still a large segment of society who seems to think security issues do not affect their mobile phones.
An infographic designed by a company called Crowd Control HQ aims to protect everyone's mobile device -- but they forgot one very important security tip!

Keep reading to learn more.

Tags:cybercrime, Hacking Threats, mobile apps, Mobile Devices, vpns, wireless security,



Will WiFi Replace Cable and Fiber Networks?

Posted on Wednesday, September 17th, 2014 by
Mimosa WiFi

In a recent blog post, we mentioned that the next generation of WiFi technology will be much faster, and that by 2018, worldwide WiFi traffic will overtake wired traffic for the first time ever.

Now see how one Silicon Valley company plans to bring high-speed WiFi networks to underdeveloped parts of the U.S. as well as developing countries.

Tags:Cloud Security, network security, wifi hotspots, WiFi Trends, wireless security,



OpenSignal’s U.S. WiFi Study Looks at Speed, But Not Network Security

Posted on Monday, September 15th, 2014 by
free wifi speed

OpenSignal is a small startup with a very interesting mission: they are creating a database of WiFi access points around the world and are hoping to become the global authority on wireless networks. Their website contains analysis of all of the data they have collected, including the WiFi signal strength of all access points in a given area.

How do they do it?

Tags:encryption, network security, vpns, wifi hotspots, WiFi Trends, wireless security,



Home Depot Hit by Data Thieves, Similar to Target Breach

Posted on Friday, September 12th, 2014 by
StoreExteriors

Have you heard about the major Home Depot attack? Some say it could be one of the largest data breaches in history, even larger than the Target data breach last year. It speaks to a lack of awareness of security protocols -- and has identity theft experts very worried.

Tags:data protection, Hacking Threats, identity theft, network security,



Android Apps Susceptible to Man-in-the-Middle Attacks

Posted on Thursday, September 11th, 2014 by
man-in-the-middles

With a man-in-the-middle attack, your app thinks it is communicating with the app’s web server, but in fact, all of your personal information is being sent directly to the hacker’s computer. Keep reading for details on the two kinds of SSL vulnerabilities that FireEye found in some of the most popular Android apps -- and how to protect yourself today.

Tags:cybercrime, data protection, Hacking Threats, mobile apps, Mobile Devices, Wifi hacking,



Study Shows Airline Passengers Are Demanding In-Flight WiFi

Posted on Tuesday, September 9th, 2014 by
airline-wifis

A new survey has found that airline passengers are now viewing WiFi as a necessity -- not an optional perk. Consider that nearly 9 in 10 (89%) would give up beverage service and bathroom access for high-speed WiFi (even though in-flight WiFi is just like any other public WiFi: completely open and insecure). Keep reading for other surprising findings from the study.

Tags:data protection, encryption, Hacking Threats, network security, vpns, Wifi hacking,



Should You Use ‘Free’ WiFi Networks at Sporting Events?

Posted on Friday, September 5th, 2014 by
football-WiFi-networkss

In this day and age this is the stadium WiFi is the new standard. Because what fun is it to be at a sporting event if you can’t post pictures on Facebook, Twitter, and Instagram?

But what you are giving up in exchange for access to so-called “free” WiFi? And who has access to your data as a result of being online at sporting events?

Tags:data protection, Hacking Threats, Mobile Devices, network security, vpns, Wifi hacking, wifi hotspots,



Google: Consumers Not Entitled to ‘Windfall’ Compensation In WiFi Snooping Lawsuit

Posted on Thursday, September 4th, 2014 by
streetviewcars

Remember the brouhaha over Google's Street View cars collecting personally identifiable information (including emails and Internet browsing activity) from WiFi networks that weren't password-protected? The U.S. government intervened (the Federal Communications Commission even fined the search giant $25,000 in 2012 for refusing to cooperate with the investigation).

But did you know that Google also ended up in a class-action lawsuit?

Tags:data protection, network security, online privacy, vpns, wireless security,



The Celebrity Photo Hack: Were Phones Hacked Over Public WiFi?

Posted on Wednesday, September 3rd, 2014 by
Screen-Shot-2014-09-02-at-4.44s

Were the phones of celebrities hacked via WiFi, perhaps at a celebrity event? Although this is not known or confirmed, it's one possibility among many being floated around the Internet in the wake of the naked photo scandal rocking Hollywood.

Tags:cybercrime, data protection, Mobile Devices, network security, online privacy, vpns, Wifi hacking,



Twitter Chat on Back-to-School Identity Protection

Posted on Tuesday, September 2nd, 2014 by
IDTheftkidss

Private WiFi and the Identity Theft Resource Center will be hosting a Twitter chat on Thursday, September 4, at 2pm ET, to discuss the hidden dangers and the ways to prevent a personal data breach of your kids’ information. Keep reading to learn some of the most commonly asked questions about children’s identity security, and of course, please join us Thursday to answer any questions you may have.

Tags:identity theft, online privacy, wireless security,



The Newest WiFi Threat: Cats

Posted on Wednesday, August 27th, 2014 by
wifi-cats

Just when you thought it was safe to use WiFi…along comes the latest threat: cats. Wait, cats? Really? Well, that is if the cat comes outfitted with the newest WiFi hacking device, called WarKitteh.

What type of encryption did Coco the cat find on his neighborhood adventures? Click to find out.

Tags:Hacking Threats, network security, online privacy, vpns, Wifi hacking,



Why the Delay? 3 Simple Steps to Protect Your Password Today

Posted on Tuesday, August 26th, 2014 by
longerpasswordss

Last week brought us the story of a Russian cybergang that hacked into the ownership of 1.2 billion usernames and passwords. Last week also presented me with the most obvious demonstration of aloofness to how people view their personal information.

So just how technologically savvy do you need to be to take one of the strongest measures available to protect your personal information? Well, let’s just say I would bet money that you can do it.

Tags:Authentication, data protection, identity theft, online privacy, passwords,



One of NYC’s Free WiFi Providers Goes Kaput

Posted on Monday, August 25th, 2014 by
free-wifis

Is New York City’s free WiFi program in trouble?

A research group known as Gotham City Research claims that Gowex, one of the five organizations that former New York City Mayor Bloomberg had chosen to provide free WiFi service in the city’s five boroughs, cooked their books and vastly overstated its earnings. Based on this report, Gowex filed for bankruptcy.

Tags:vpns, wifi hotspots, WiFi Trends, wireless security,



Nothing Safe about Library WiFi Networks

Posted on Friday, August 22nd, 2014 by
library-wifis

It’s back-to-school season, and if you like to surf the Internet while at the library (or even file your taxes), remember that nearly all library WiFi networks are completely open. This means that anything you do online at the library could potentially be seen and intercepted by another person on the same network.

Keep reading for essential tips to protect you (and your children) on any library’s WiFi network.

Tags:data protection, network security, online privacy, vpns, wifi hotspots, wireless security,



Mobile Threats: What You Need to Know About Mobile Payment Risks and Responsibilities

Posted on Wednesday, August 20th, 2014 by
shutterstock_139696714s

As we continue to rely on the precarious mix of mobile banking & payments, mobile apps, and public WiFi hotspots, it’s perhaps not such a surprise that online bank fraud is escalating. Quite a bit of this fraud is perpetrated by malicious apps that users inadvertently download on their mobile devices. App developers with malicious intent have become quite adept at concealing the surreptitious nature of these apps.

Tags:Hacking Threats, mobile apps, Mobile Devices, Online Payments, WiFi Trends,



4.5 Million Risk ID Theft After Hospital Network Hacked

Posted on Tuesday, August 19th, 2014 by
community_health_locationss

Is malware to blame? Community Health Systems, a company that operates 206 hospitals across the United States, has admitted that hackers recently broke into its computers and stole data on 4.5 million patients.

The company says it secures itself with cyber-liability policies to protect their bottom line. But do the hospitals affiliated with this profitable corporation truly explain to new patients how and where their most sensitive personal information is being shared, saved, and protected?

Tags:cybercrime, data protection, identity theft,



Russia’s Latest Privacy Outrage: All Public WiFi Users Must Identify Themselves

Posted on Monday, August 18th, 2014 by
russia-WiFis

Want to log onto public WiFi in Russia? Well, according to a new law recently passed there, if you want to use public WiFi anywhere in the country, you must now provide information that completely obliterates any online privacy, apparently so Russian authorities can track everything you do online.

Tags:online privacy, wifi hotspots, WiFi Trends,



Goodwill Data Breach: Even Charities Are Susceptible to Cyber Criminals

Posted on Friday, August 15th, 2014 by
Goodwill breach

It’s believed that Goodwill stores in as many as 21 states may have been hacked for the credit card data of consumers who’ve shopped at the thrift stores. Some signs have led investigators to believe these cybercrimes may have begun as early as May of 2012. But what would make someone stoop so low as to attack a charity whose purpose is to restore a sense of pride in people who are in need, mostly by providing them with training and skills to find better jobs?

Tags:data protection, identity theft, network security,



Auslogics Selects Private WiFi as its Exclusive VPN Partner to Protect BoostSpeed Users

Posted on Wednesday, August 13th, 2014 by

Private WiFi Offers Special Pricing on its VPN for BoostSpeed Customers, Thwarts Identity Theft, Hacking, and Other Potential Threats that WiFi Hotspots Pose NEW YORK, NY – (Marketwired – August 13, 2014) – Private WiFi today is proud to announce a new partnership with Auslogics, a leading developer and publisher of computer maintenance and optimization [ Read More → ]





Private WiFi Unveils WiFi Dashboard to Alert Windows 8 Users When a Wireless Network Is Unsecure

Posted on Wednesday, August 13th, 2014 by

Private WiFi today unveiled a new free app -- WiFi Dashboard -- for Windows 8 personal computers and Surface tablets, which will alert users when they are using unsecure or unencrypted WiFi. Many hotspots -- whether people access them in a hotel, coffee shop, park, or are using an open connection at home -- are unsecure. WiFi Dashboard shows the connectivity status of the network and provides information about the network name, IP address, and location. This new app is the first of its kind for Windows 8 to alert people when they are connected on an unsecure connection, so that they can take immediate steps to protect their identity and personal information.





WiFi to Get Faster and Overtake Wired Traffic by 2018

Posted on Tuesday, August 12th, 2014 by
future-of-wifis

The next generation of WiFi technology will be able to transmit over 7 Gbps (gigabytes per second) data speed, and by 2018, worldwide WiFi traffic will overtake wired traffic for the first time ever.

This means that as fast as things move now in the digital world, they will begin to move even faster.

Tags:Mobile Devices, vpns, WiFi Trends,



Personal Data Privacy: Living In the ‘Golden Age’ of Internet Surveillance

Posted on Monday, August 11th, 2014 by
internet-surveillances

While the Internet initially provided a platform for the powerless, governments and big business are now using the power of the Internet to collect unprecedented amounts of data about us. How has this happened?

Tags:data protection, identity theft, online privacy,



Boston’s MBTA to Get Free WiFi, But What About Security?

Posted on Thursday, August 7th, 2014 by
MBTAs

In response to complaints from riders about slow and uneven WiFi service, Boston’s MBTA announced a $5.6 million agreement to upgrade free WiFi service on its commuter rail lines. But do commuters truly understand the security risks inherent to public WiFi networks?

Tags:Hacking Threats, Mobile Devices, WiFi Trends, wireless security,



Infographic: Inspire WiFi Highlights the Risks and Rewards of Public WiFi

Posted on Tuesday, August 5th, 2014 by
Public WiFi usage

Inspire WiFi, a company that provides WiFi networks for families, as well as the hospitality and healthcare industries, recently released a cool graphic which highlights just how much we are using public WiFi, as well as the dangers inherent to these kinds of open networks.

Tags:encryption, Hacking Threats, network security, WiFi Trends, wireless security,



Will the FCC’s $2 Billion Plan for School WiFi Create More Problems Than It Solves?

Posted on Monday, August 4th, 2014 by
schools

WiFi in schools has been happening with much enthusiasm all over the country. So recent news that the Federal Communications Commission will spend $2 billion to boost wireless Internet connectivity in U.S. schools and libraries during the next two years should be a good thing, right?

While FCC Chairman Tom Wheeler has called it a “watershed moment” to give wireless access to 10 million kids, give or take, privacy experts are raising a collective eyebrow.

Tags:BYOD, network security, WiFi Trends, wireless security,



Rethinking the Security of Health and Fitness Apps

Posted on Thursday, July 31st, 2014 by
fitness apps

It might be hard to envision life before the convenience of portable devices emerged on the market. Providing everything from instant connectivity and access to information, tablets and smartphones can feel like we’re carrying a portable personal assistant everywhere we go.

But one trend emerging in the mobile device market does have its critics raising the alarm for personal security, and that’s the high numbers of consumers who use health and fitness apps. These apps, which track our healthy habits and exercise information, seem like a great way to foster a healthy lifestyle, but the reality has industry experts a little concerned.

Tags:identity theft, online privacy,



‘Free Social WiFi’ Isn’t Exactly Free

Posted on Tuesday, July 29th, 2014 by
Social WiFi

The idea behind the concept of social WiFi is pretty simple: merchants offer free WiFi service to customers who visit their stores in exchange for customers logging into their network using their Facebook or LinkedIn accounts, or by giving the merchant their email address.

But what do you trade in exchange for logging into the merchant’s social WiFi network?

Tags:Authentication, data protection, network security, online privacy, WiFi Trends,



Facial Recognition: The Scariest Privacy Issue

Posted on Monday, July 28th, 2014 by
facial

No one doubts that biometric identification is a powerful tool with many possible applications. But there’s a downside to this technology: in essence, our faces can now be used for government tracking and surveillance that was not possible until now. And there are few safeguards currently in place to curb excessive use of this tool.

Tags:Authentication, cybercrime, identity theft, online privacy,



Wireless Safety Tips for Travelers from Private WiFi and STOP.THINK.CONNECT.: [INFOGRAPHIC]

Posted on Thursday, July 24th, 2014 by
OnTheGoWiFiSafety

Warning: There is an invisible safety threat that you will encounter on your next vacation. No matter where you are going or when, you will likely encounter WiFi on your journey. While the convenience of such a connection is alluring to any vacationer, understanding the dangers associated with using that wireless hotspot are paramount and it is up to you to protect yourself.

Tags:Authentication, data protection, Mobile Devices, online privacy, passwords, vpns, wifi hotspots,



TRUSTe’s Survey Shows That We Are Concerned about Mobile Device Privacy

Posted on Tuesday, July 22nd, 2014 by
Truste study, mobile tracking

These days we are using mobile phones and tablets more and more, and this trend away from computers to mobile devices will continue in the years to come, according to a survey about consumer attitudes and mobile device privacy released by TRUSTe, a leading privacy services provider.

Tags:data protection, mobile apps, Mobile Devices, online privacy, WiFi Trends,



Can Google Glass Steal Your Online Banking Passwords Just By Looking?

Posted on Monday, July 21st, 2014 by
Google Glass

Privacy expectations have been evolving or changing for several years. As younger generations become more comfortable sharing personal information with less expectation that it will remain private, it’s no secret that our online privacy expectations are fading fast.

Tags:cybercrime, data protection, Hacking Threats, mobile apps, Mobile Devices, online privacy, WiFi Trends,



Sophos’ Warbiking Campaign Goes to Las Vegas and Sydney

Posted on Friday, July 18th, 2014 by
sophos-warbike-01-620x348s

If you remember the article we posted a few months ago about Sophos’ warbiking tour, you’ll recall that Sophos found that only 13% of WiFi users in San Francisco were connecting to the Internet using WPA2 security, the recommended best-practice protocol and the safest security protocol currently available.

 

Tags:encryption, Hacking Threats, network security, Wifi hacking, wifi hotspots, wireless security,



Zone Alarm Highlights the Risks of Public WiFi

Posted on Wednesday, July 16th, 2014 by
Screen-Shot-2014-07-15-at-10s

A shocking two thirds of us (64%) have little or no concern about connection to public WiFi networks, despite the fact that everything we do on these networks can be viewed and stolen by others. Check out a study by Zone Alarm, which highlights three of the biggest risks on public WiFi: man-in-the-middle attacks, rogue WiFi networks, and packet sniffers.

Tags:cybercrime, encryption, network security, Wifi hacking, wireless security,