• Skip to main content
  • Skip to header right navigation
  • Skip to after header navigation
  • Skip to site footer
RestorePrivacy

RestorePrivacy

Your online privacy resource center

  • Home

General

Home

News

About

Contact

Privacy Tools

  • Secure Browsers
  • Secure Email
  • Private Search Engine
  • Best VPN Services
  • Data Removal Services
  • Best Password Managers
  • Secure Messaging Apps
  • Ad Blockers
  • Identity Theft Protection

Newsletter

Coming soon.

No spam, ever.

  • Home
  • News
  • Email
    • Secure Email
    • ProtonMail Review
    • Tutanota Review
    • Mailfence Review
    • Mailbox.org Review
    • Hushmail Review
    • Posteo Review
    • Fastmail Review
    • Skiff Mail Review
    • StartMail Review
    • Runbox Review
    • Temporary Disposable Email
    • Encrypted Email
    • Alternatives to Gmail
  • Password
    • Best Password Managers
    • KeePass Review
    • NordPass Review
    • 1Password Review
    • Dashlane Review
    • RoboForm Review
    • LastPass Review
    • Bitwarden Review
    • Strong Password
  • Storage
    • Best Cloud Storage
    • pCloud Review
    • Nextcloud Review
    • IDrive Review
    • SpiderOak Review
    • Sync.com Review
    • MEGA Cloud Review
    • NordLocker Review
    • Tresorit Review
    • Google Drive Alternatives
  • Identity Theft
    • Identity Theft Protection
  • VPN
    • What is VPN
    • VPN Reviews
    • VPN Comparisons
    • Best VPNs
    • VPN Coupons
    • VPN Routers
  • Messenger
    • Secure Messaging Apps
    • Signal Review
    • Telegram Review
    • Wire Review
    • Threema Review
    • Session Review
  • Tools
    • Secure Browser
    • Ad Blocker
    • Secure Email
    • Private Search Engine
    • Password Manager
    • Secure Messaging App
    • Tor
    • Identity Theft Protection
    • Unblock Websites
    • Browser Fingerprinting
    • Privacy Tools
  • Info
    • Mission and Site Guidelines
    • Press
    • Contact

Heinrich Long

CyberGhost VPN Client Vulnerable to Man-in-the-Middle Attacks

CyberGhost VPN Client Vulnerable to Man-in-the-Middle Attacks

April 6, 2023 by Heinrich Long

A security researcher has discovered multiple vulnerabilities impacting the Linux version of the CyberGhost VPN client, which could be exploited for …

How to Check if Your Data Was Sold on the Genesis Market

How to Check if Your Data Was Sold on the Genesis Market

April 5, 2023 by Heinrich Long

The Dutch police have released an online tool that helps people check if their email and digital fingerprint data were offered for purchase on the now …

Mullvad Browser

Mullvad VPN Partners with the Tor Project to Release New Browser

April 3, 2023 by Heinrich Long

Mullvad VPN and the Tor Project have partnered to release the ‘Mullvad Browser,’ a privacy-focused web browser created specifically for use with a VPN …

TorKameleon: Strengthening Tor Against Deanonymization Attacks

TorKameleon: Strengthening Tor Against Deanonymization Attacks

April 1, 2023 by Heinrich Long

Portuguese researchers have presented a prototype system named ‘TorKameleon,’ which enhances Tor network’s resistance to …

ChatGPT chatbot by OpenAI - artificial intelligence

Italian Data Authority Targets ChatGPT for Privacy Violations

March 31, 2023 by Heinrich Long

The Italian data protection authority (GPDP) announced the launch of an inquiry against OpenAI for multiple user privacy law violations by ChatGPT. …

Malware Pushed as VPN Won’t Infect Victims Using a Real VPN

Malware Pushed as VPN Won’t Infect Victims Using a Real VPN

March 29, 2023 by Heinrich Long

A new malware named OpcJacker has been using the disguise of a VPN to trick users into downloading and running it on their system. OpcJacker was …

Google Reveals Attack Chains Used in Spyware Campaigns

Google Reveals Attack Chains Used in Spyware Campaigns

March 29, 2023 by Heinrich Long

Google’s Threat Analysis Group has identified spyware campaigns targeting Android and iOS users worldwide, exploiting zero-day vulnerabilities. …

Office Supplies Giant Essendant Ransomware

Office Supplies Giant Essendant Was Hit by Ransomware

March 25, 2023 by Heinrich Long

Distributor of office supplies Essendant has disclosed today that it suffered a ransomware incident on March 6, 2023, which forced the firm to take …

Persistent Fingerprinting Beats Most Modern Browser Protections

Persistent Fingerprinting Beats Most Modern Browser Protections

March 21, 2023 by Heinrich Long

Current web fingerprinting solutions can still bypass most privacy protections offered in modern web browsers, persistently tracking users and …

S.T.A.L.K.E.R. 2 Breach Leak Hack Data

15GB of Data from the S.T.A.L.K.E.R. 2 Video Game Leaked Online

March 16, 2023 by Heinrich Long

A user has leaked 15GB of data stolen from the developer of the highly-anticipated video game S.T.A.L.K.E.R. 2 at the start of the month. …

NordVPN Gives Meshnet Feature for Free to All Users

NordVPN Gives Meshnet Feature for Free to All Users

March 13, 2023 by Heinrich Long

NordVPN has decided to open access to its Meshnet feature to everyone, regardless of whether they have a subscription to the company’s products. …

New Prometei Botnet Version Infects Devices in 155 Countries

New Prometei Botnet Version Infects Devices in 155 Countries

March 13, 2023 by Heinrich Long

The Prometei botnet has returned in a new global campaign and has already infected 10,000 devices in 155 countries, with the number of breaches …

  • Previous
  • Page 1
  • Interim pages omitted …
  • Page 11
  • Page 12
  • Page 13
  • Page 14
  • Page 15
  • Interim pages omitted …
  • Page 18
  • Next

Sidebar

Follow Us:

  • X
  • Mastodon
  • Facebook

Digital Privacy Essentials:
Secure Browser
Private Search Engines
Secure Email
Best Password Managers
Secure Messaging Services
Best Ad Blockers
Best VPN Services
Secure Cloud Storage

Privacy & Security Guides:
Privacy Tools
Alternatives to Google Products
Firefox Privacy Modifications
Five Eyes, 9 Eyes, 14 Eyes Spying
Browser Fingerprinting
Is Tor Safe?
Alternatives to Gmail
VPN vs Tor
Alternatives to WhatsApp
Is Your Antivirus Spying on You?
Controlling Communication Channels is Crucial for Privacy
Anonymity Networks: VPNs, Tor, and I2P
How to Really Be Anonymous Online
Private and Anonymous Payments

Secure Email Reviews:
ProtonMail Review
Tutanota Review
Mailfence Review
Mailbox.org Review
Hushmail Review
Posteo Review
Fastmail Review
Runbox Review
CTemplar Review
Temporary Email Services
Encrypted Email

Password Manager Reviews:
Bitwarden Review
LastPass Review
KeePass Review
NordPass Review
Dashlane Review
1Password Review
Best Password Managers

Secure Messaging App Reviews:
Wire Review
Signal Review
Threema Review
Telegram Review
Session Review
Wickr Review

Secure Cloud Storage Reviews
Tresorit Review
MEGA Cloud Review
Sync.com Review
Nextcloud Review
IDrive Review
pCloud Review
SpiderOak Review
NordLocker Review

How To Guides
How to Encrypt Files on Windows
How to Encrypt Email
How to Configure Windows 10 for Privacy
How to use Two-Factor Authentication (2FA)
How to Secure Your Android Device for Privacy
How to Secure Your Home Network
How to Protect Yourself Against Identity Theft
How to Unblock Websites
How to Fix WebRTC Leaks
How to Test Your VPN
How to Hide Your IP Address
How to Create Strong Passwords
How to Really Be Anonymous Online

About RestorePrivacy

Contact

About

RestorePrivacy is a digital privacy advocacy group committed to helping you stay safe, secure, and private online. You can support this project through donations, purchasing items through our links (we may earn a commission at no extra cost to you), or sharing this information with others. See our mission here.

  • X
  • Facebook
  • Mastodon

And for cybersecurity news, check out CyberInsider.

Digital privacy Checklist:

  1. Secure browser: Brave or Modified Firefox
  2. VPN: NordVPN (74% off coupon)
  3. Ad blocker: uBlock Origin or AdGuard
  4. Secure email: ProtonMail or StartMail
  5. Secure messaging: Signal or Threema
  6. Private search engine: MetaGer or Brave
  7. Password manager: NordPass or Bitwarden
  8. Identity theft protection: Aura
  9. Data removal service: Incogni

Copyright © 2025 Restore Privacy, LLC · Privacy Policy · Terms of Use · Contact · Sitemap · All Rights Reserved