General WiFi and network protection. The encryption that secures your transmitted data to and from a VPN server guarantees you won't find yourself transmitting or requesting data in a visible format. You will therefore stay protected from a variety of attacks, including those mentioned below, and more.
WiFi protection against Firesheep hacks – a secure VPN keeps you safe from session jacking software that allows its user to easily intercept email and social media network passwords on wireless connections, even when encrypted by WPA/WPA2 encryption.
WiFi protection against Droidsheep – imagine Firesheep but packed into a smartphone so the session jacking operator can carry out their activity in public places without fear of being caught. That's Droidsheep. An encrypted VPN tunnel protects you from this hackware too.
WiFi and network protection against Wireshark sniffing – Secure VPN connection will safeguard all your transferred data from this powerful packet sniffing software which can be used for password theft, VoIP eavesdropping and identity theft.
Secure Instant Messaging. IMs are extremely vulnerable to interception, as both your IP address and the content of your messages are nearly always transferred in an unsecure, unencrypted format. Using an encrypted connection (VPN) will secure instant messaging.
Evil Twin WiFi protection – some cyber thieves set up fake wireless connections to lure unsuspecting users into a network designed specifically for id data theft. Often it is difficult to spot such a network as it copies the SSID (wireless name) of a familiar connection and is often boosted in signal strength so it appears first in your list of available networks. How to connect to a wireless network safely? Run your connection through a personal VPN service.
Stay hidden from hackers (and journalists!) that target you. The anonymity of VPN technology prevents hackers from finding you online. This point is especially true of super VPN services (like ours, of course), which can be configured to change server intermittently for improved IP privacy and anonymity. If hackers, cyber stalkers and cyber bullies can't find you by IP or email address, it's much, much harder for them to hack you.