Google condemns but supports censorship

Eric Schmidt, Google’s CEO, recently commented about his conviction before the U.S. Johns Hopkins University that Internet censorship should end within a decade. Google boss also said that a better encryption use shall allow users to fight against governments’ oversight. Eric Schmidt clearly targets dictatorial regimes or those practicing a strict control of the Internet

Read More...

McAfee evaluation of cybercrime in Q3 2013

McAfee has just unveiled its latest analysis of the main cybercrime trends for the third quarter of 2013 : it shows that cybercriminals have not taken much holiday this summer. “During this summer, we have added  20 million of new samples in the McAfee” zoo”, which now gathers a total of 170 million elements”. We

Read More...

Internet security is everyone’s business

Cybercrime is booming, with data hacking, identity theft and other malicious practices that continue to be practiced worldwide. Our digital lifestyle generates an impressive amount of information 2.5 trillion bytes of data each day. This figure reflects the growing number of computers, sensors and screens that surround us. The era of “surround computing” improves our

Read More...

Towards the end of using Internet passwords?

Passwords play a crucial role in helping us to protect our privacy, but … are they as secure as they should be? And are there other ways for reinforced security ? In our society, based on property, privacy and confidentiality , it is crucial to be able to identify oneself safely . The key you

Read More...

Cost of cybercrime is booming

According to HP, the cost of cybercrime has increased by 78% in four years and in the same, the time required to respond to attacks has more than doubled. Moreover, attacks are getting much more frequent. Developed by the Ponemon Institute for HP, the 2013 edition of the Cost of Cybercrime study shows that cybercrime

Read More...

Censorship in China is growing

The censorship of the incident that happened on October 29th in the famous Tiananmen Square demonstrates the continued commitment of China to eliminate any challenge. But how does China manages to control internet and social networks? … The vehicle that drove into the crowd on Monday 29th and was set into fire under Mao’s portrait

Read More...

The map of countries monitored by the NSA

Since last June, the media reported much about the American National Security Agency (NSA) worldwide monitoring program. More than a dozen countries have been affected by this oversight, to varying degrees. Imagine an absolute Internet monitoring system that sneaks into your privacy: your audio and video p2p activities, photos, e- mails, passwords are intercepted and

Read More...

Indonesia is a paradise for cybercriminals

Indonesia has become the country hosting the largest number of cyber-attacks in the world, as revealed in a study of Akamai, a company specializing in computer servers. Indonesia now ranks first, ahead of China for the second quarter of 2013. These two countries concentrate nearly 71 % of the world cybercriminals. If Akamai acknowledge the

Read More...

The new version of www.le-vpn.com website is online!

The whole team of Le VPN is pleased to present you the new Le VPN website. It is now more interactive, with lots of content and videos offering complete information on how to secure your Internet connection, wherever you are in the world. In the information section, you’ll find everything you ever wanted to know

Read More...

You can correct almost everything you say on Facebook

A spelling error, an ambiguous word, a youthful indiscretion or a crazy night … On Facebook, it’s easy to post messages that are not always consistent  and may eventually turn against you . And the only remedy so far, was to remove everything when finally realizing about the mistake. A solution to this problem finally

Read More...