Aug 24 2018

NordVPN apps for iOS and macOS

Category: VPNDISC @ 4:31 pm

Redesigned NordVPN apps for iOS and macOS are available now!

NordVPN team has been on a mission “Make the app UX go WOW” for a while. As they want users to have smooth and hassle-free NordVPN experience, rethinking our app navigation from the ground up felt like the right thing to do. Tweak after tweak, and today NordVPN’re more than excited to introduce the redesigned NordVPN apps for iOS and macOS! This a major design update, so let’s take a closer look.

NordVPN app for iOS goes 4.0. What’s inside?

Once you open the updated app, the view and navigation you will see is likely to remind you of a deck of cards. We organized our app this way to make it more thumb-friendly and clear for finding what you’re looking for.

Swipe up to browse servers

What can you do with a simple swipe-up? Great things, great things… From now on, by swiping up in the main map screen you’ll get one-tap access to:

  • Servers by country
  • Specialty servers
  • Search
  • Your favorites’ list

 

Anonymous VPN Service

NordVPN – The World’s most advanced VPN 

 


Tags: vpn


Oct 17 2008

SmartPhone and Security

Category: Information Security,Smart PhoneDISC @ 1:53 am

Mobile spyware is malicious software which is used to spy and control mobile devices (BlackBerry, PDAs, Windows Mobile and Cell Phones). Mobile spyware will not only intercept the message between two devices but also determine the location of the device. Basically, mobile spyware software is installed on a mobile device to spy on them.

Small businesses are usually not equipped to handle these threats. Just like laptops and desktops – mobile devices need security controls like antivirus, personal firewall, encryption and VPN to provide needed level of protection. Small businesses need to be aware of the security threats, like they might think that they are installing a game, which might very well be a key logger (logs your key strokes) or trojan software.

[TABLE=6]

Hackers on the move, WSJ August 11, 2008 by Roger Cheng – where he writes about more companies are letting employees use their personal smart phone at work and the security experts warns about the present threats in the industry. http://online.wsj.com/article/SB121803418845416977.html

Tips to safeguard your smartphone
httpv://www.youtube.com/watch?v=S64J4BCCoi4


(Free Two-Day Shipping from Amazon Prime). Great books

Tags: antivirus, encryption, hacker, intercept, key logger, malicious, mobile phone, mobile spyware, personal firewall, roger cheng, security controls, security expert, spy, threats, trojan, vpn, wsj