Nikolos Faslow

Security Engineer
Nikolos Faslow

Education: Having worked as a common journalist, he decided to alter his life for the better and started working in the area of security and information. Originally from the US, he wants freedom for the citizens, this is precisely why he graduated from RIT (Rochester Institute of Technology) and later finished the M.S. in Computing Security and Information Assurance program.


What is your major achievement in work?

I suppose the fact that up until I graduated from RIT, I started self-development in the sphere of Internet security as a journalist. Besides, I work in the team of people who are professionals of their field.  


What do you think about Internet security?

A stop to such today’s realities as data leaks, computer fraudulence, hacking of official and private accounts, news channels and social net profiles is Internet security brought into action. Unfortunately, there are still few people that give an account of the problem and strive for Internet freedom. Privately, I think that Internet security should be a must have for all security-concerned people.


Where do you stand on VPN legitimacy?

As soon as I work for online freedom for the US citizens, as well as citizens of other countries, through VPN rating maintenance, it would be silly to confirm that VPNs are illegal. I suppose that everything depends mainly on users activities. Providing that a customer runs a VPN service or some other anonymizers for prohibited practice on the deep web, of course, the service is noticeable here like something illegal. In opposition to this, a customer who applies the service for speaking out online makes nothing illegal in keeping with constitutions of different countries.


What is your golden rule for internet surfing?

So, every time I access the Internet at home, work or any public place, a VPN is the first thing to be switched on. It’s no secret that citizens of different countries are monitored by their government authorities, employers, aside from numerous adversaries, which is normally considered by any average customer as something unethical and unlawful. From my end, I want to be protected from any outside interference into my private space, that’s exactly why I run a VPN to protect myself.

Author's content

Hackers can steal sensitive data via Amazon Echo: keep an eye on cybersecurity
Modern IT companies create a huge number of devices for multiple needs of their customers. All of them are produced to...
August 04, 2017
A brand-new security lab is launched for testifying medical appliances cybersafety
The MDISS is aimed at reforming patients’ safety and cybersecurity of medical gadgets. It works out advanced practical...
August 02, 2017
Will behavioral biometric authentication protect users against identity theft?
Modern consumers have already estimated the convenience of purchasing goods via the Internet.  You can easily choose a...
July 29, 2017
FruitFly 2: the malware attacked Mac computers again
It seemed that Mac users are less vulnerable to malicious attacks. Nevertheless, malware that has been discovered...
July 26, 2017
ESG’s survey: Cybersecurity has changed over 2 years
A brand-new ESG research article ‘’Cybersecurity Analytics and Operations in Transition’’ has been recently publicized...
July 22, 2017
Watch out! Fake Tor browser ropes victims into fictitious Dark Marketplace
Lately a specialist from Bleeping Computer discovered scumware which is masked for the Tor browser. This fabricated app...
July 19, 2017
5 simple hacks that will change the way you do shopping online
Millions of people hit the online shops in search of things they need. It is pretty convenient as you can make...
July 16, 2017
 ITU’s global cybersecurity outlook: Singapore keeps the highest level
Not long ago the specialists from ITU (International Telecommunication Union) conducted global cybersecurity research....
July 13, 2017
5 Stunning Pros to Bulletproof Your Business Network
Holding a startup project or a mid-sized business you need to develop great care to your growing network protection....
July 12, 2017
Use these 5 hacks for cybersecurity on vacation. #5 is awesome
Summer is a great season for vacation near the seaside, traveling around the world or just enjoying its sunshine and...
July 11, 2017
ibVPN has offered a bundle for the plan!
Are you tired of torrid hot sunny weather? Are you dreaming about cool days? Not now, because this summer is getting...
July 08, 2017
Best VPNs for Endpoint Security
How does a VPN work? What are the main VPN features for endpoint security? At present more and more companies can’t...
July 06, 2017
Best VPNs for Juniper network
What is a VPN?​ How to defend the network with a VPN? Juniper Networks is an American international company which...
July 06, 2017
Best VPNs to bypass throttling
How to stop ISP throttling? Is it possible to avoid throttling on iPhone? The number of internet users is...
July 06, 2017
5 essential ransomware prevention tips
Just a few years ago, the two main forms of cyber theft were credit card data stealing and identity fraud. In order to...
July 04, 2017