Nikolos Faslow

Security Engineer
Nikolos Faslow

Education: Having worked as a common journalist, he decided to alter his life for the better and started working in the area of security and information. Originally from the US, he wants freedom for the citizens, this is precisely why he graduated from RIT (Rochester Institute of Technology) and later finished the M.S. in Computing Security and Information Assurance program.


What is your major achievement in work?

I suppose the fact that up until I graduated from RIT, I started self-development in the sphere of Internet security as a journalist. Besides, I work in the team of people who are professionals of their field.  


What do you think about Internet security?

A stop to such today’s realities as data leaks, computer fraudulence, hacking of official and private accounts, news channels and social net profiles is Internet security brought into action. Unfortunately, there are still few people that give an account of the problem and strive for Internet freedom. Privately, I think that Internet security should be a must have for all security-concerned people.


Where do you stand on VPN legitimacy?

As soon as I work for online freedom for the US citizens, as well as citizens of other countries, through VPN rating maintenance, it would be silly to confirm that VPNs are illegal. I suppose that everything depends mainly on users activities. Providing that a customer runs a VPN service or some other anonymizers for prohibited practice on the deep web, of course, the service is noticeable here like something illegal. In opposition to this, a customer who applies the service for speaking out online makes nothing illegal in keeping with constitutions of different countries.


What is your golden rule for internet surfing?

So, every time I access the Internet at home, work or any public place, a VPN is the first thing to be switched on. It’s no secret that citizens of different countries are monitored by their government authorities, employers, aside from numerous adversaries, which is normally considered by any average customer as something unethical and unlawful. From my end, I want to be protected from any outside interference into my private space, that’s exactly why I run a VPN to protect myself.

Author's content

Security principles: what every developer needs to know
If you recently joined the world of professional software developers, you may think that you have it all figured out....
August 27, 2017
5 most frequent cyber-attacks that exist on the Internet today
Hacker attacks are nothing new, but they seem to have evolved in terms of shrewdness, scale and impact. As recent...
August 26, 2017
OurMine hackers break into HBO’s Facebook and Twitter accounts
It has been officially reported that HBO was opposed to a cyber attack on Wednesday. Several TV profiles and their...
August 19, 2017
How to protect your Mac against Mughthesec
Although Mac is still considered to be a safe operating system, there are numerous reports about Mac-targeted malware....
August 16, 2017
Millions of Movilnet's GSM Clients in Venezuela Left without Mobile Service
Cyber hackers, that performed cyberattacks on Venezuela’s government website several days ago, have deprived 7 million...
August 13, 2017
A mysterious fake profile is behind a threatening phishing attack on LinkedIn
Social media networks are essential to people’s communications as they help them to keep in touch, share best moments...
August 11, 2017
Major German cryptocurrency exchange passed the data about their users to the law enforcement agencies
It has become known that one of the biggest German online bitcoin exchanges ‘’Bitcoin.de’’ provided the users’ personal...
August 08, 2017
Hackers can steal sensitive data via Amazon Echo: keep an eye on cybersecurity
Modern IT companies create a huge number of devices for multiple needs of their customers. All of them are produced to...
August 04, 2017
A brand-new security lab is launched for testifying medical appliances cybersafety
The MDISS is aimed at reforming patients’ safety and cybersecurity of medical gadgets. It works out advanced practical...
August 02, 2017
Will behavioral biometric authentication protect users against identity theft?
Modern consumers have already estimated the convenience of purchasing goods via the Internet.  You can easily choose a...
July 29, 2017
FruitFly 2: the malware attacked Mac computers again
It seemed that Mac users are less vulnerable to malicious attacks. Nevertheless, malware that has been discovered...
July 26, 2017
ESG’s survey: Cybersecurity has changed over 2 years
A brand-new ESG research article ‘’Cybersecurity Analytics and Operations in Transition’’ has been recently publicized...
July 22, 2017
Watch out! Fake Tor browser ropes victims into fictitious Dark Marketplace
Lately a specialist from Bleeping Computer discovered scumware which is masked for the Tor browser. This fabricated app...
July 19, 2017
5 simple hacks that will change the way you do shopping online
Millions of people hit the online shops in search of things they need. It is pretty convenient as you can make...
July 16, 2017
 ITU’s global cybersecurity outlook: Singapore keeps the highest level
Not long ago the specialists from ITU (International Telecommunication Union) conducted global cybersecurity research....
July 13, 2017