CometVPN Blog

Cybersecurity & Privacy

9 min read

How to Detect and Protect Against Pegasus Spyware?

A cybercriminal isn't always a loner writing code in his mom's basement. Often, malicious software is created by multimillion-dollar corporations with their own LinkedIn profiles and Wikipedia pages.

Such is the NSO Group, the developers of the notorious Pegasus spyware. This software can extract a wealth of data from the victim's smartphone - conversations, chats, photos, geo-location, without them even falling for a phishing attack.

The company positions itself as fighting terrorism but has been listed as a threat to the US, and, reportedly, Pegasus spyware was used against journalists and activists. The lines between proper and improper spyware are becoming blurry. What can we do to avoid it being used against us?

Adomas Šulcas

Cybersecurity & Privacy
Networking & Internet Basics

5 min read

Best DNS Servers for Gaming in 2025 (Ranked & Tested)

Key takeaways:

  • The best DNS server choice depends on what your priorities are: speed or privacy.
  • Use tools to test your primary DNS and secondary DNS for lower latency.
  • Research whether you need a DNS provider or a VPN for best gaming experience.
  • When you’re deep into a match and your shots aren’t landing right, it might not be your aim. It could be your DNS. DNS stands for Domain Name System, and its main goal is to find the right IP address so you can successfully connect every time you enter a website name.

    In online games, your connection speed matters a lot. During intense gaming sessions, you always want quick response times and lower latency.

    Here, we’ll break down the best DNS servers for gaming, how they impact your gaming experience, how to test them, and how to set them up.

    Adomas Šulcas

    Cybersecurity & Privacy

    4 min read

    What is FBI Honeypot: Understanding Privacy Implications

    An international law enforcement team has successfully arrested hundreds of criminals and seized their illegal assets. All thanks to an allegedly encrypted messaging app with data collection backdoors for the FBI.

    That's where the name FBI honeypot comes from. But while effective in catching criminals, honeypots raise important privacy and security concerns.

    After such a precedent is set, how can anyone be sure he isn't falling for a honey trap even without any criminal intentions?

    Adomas Šulcas

    Cybersecurity & Privacy

    7 min read

    IP Fragmentation Attack: Understanding the Threat and How to Prevent It

    We’re all familiar with the pain of sudden internet connection problems, instability, and the constant website crashes. And while this could just be an innocent connection loss, it could also be a sign of an IP fragmentation attack.

    Although a lesser-known threat, it’s a type of cyber attack that exploits the way internet protocols handle data transmission to evade firewalls, disrupt services, and infiltrate networks undetected.

    If successful, a slowed internet would be the least of your worries – there would also be a risk of major application crashes, and worst still, malicious and unauthorized data breaches. That’s why it’s important to be informed and know how to protect your device properly.

    Rasa Sosnovskytė

    Cybersecurity & Privacy

    4 min read

    5 Tips to Prevent Screen Hacking

    Screen hacking is a new type of attack that injects fake touchpoints on a touchscreen by using electromagnetic interference EMI. A hacked screen can be used to perform any action on the device, including opening browsers, sending messages, or installing software.

    Hackers use dedicated devices to send signals to your touchscreen that mimic the same signal sent when the screen is being touched. Luckily, it’s currently impossible to do that from a long distance, so the person has to be within a few meters of you, making it easier to understand what’s going on.

    Rasa Sosnovskytė

    Cybersecurity & Privacy

    6 min read

    Password Entropy: Definition and How to Calculate It

    Password entropy is a key concept for creating a strong password. Expressed in bits of entropy, it gives us an objective measurement of how difficult it is to crack, guess, or brute-force attack passwords.

    We all know that strong passwords must be complex and include lots of special characters, numbers, lowercase, and uppercase letters. Understanding what password entropy is and how to calculate it helps create strong passwords you can remember but criminals struggle to crack.

    Guoda Šulcaitė