Internet security

A series of ones and zeroes making up the image of an eye.

What is spyware and how do I remove it?

4 min read
Identity theft affected nearly 15 million Americans last year, racking up 4 billion USD in losses. And if you...
Message icons with a password lock on a speech bubble.

Protect your messaging apps with a password now

3 min read
We’ve previously written about which messaging apps you should be using instead of Facebook Messenger, WhatsApp, and Snapchat. (If...
A crowd hold their phones aloft.

The most secure messaging apps in 2019

6 min read
From WhatsApp to Snapchat, messaging apps provide a free and easy service to communicate with friends, family, and co-workers. Without encryption, however, private messages could...
An illustration of a laptop, but the screen is the classic warning sign. You know, the triangle with an exclamation point in it.

4 new cybersecurity threats in 2019

4 min read
Cybersecurity threats continue to evolve, and the nature and sophistication of attacks vary widely. With more businesses moving their files to the cloud, health...

ExpressVPN and HP provide VPN protection to PC users

1 min read
We’re thrilled to announce that ExpressVPN is working with HP to help its users stay private and secure online. VPNs are indispensable tools for...
A thief attempts to steal a laptop.

6 of the biggest crypto heists of all time

5 min read
When you store your money in a traditional bank, you do so because you have few other options. Of course, it’s possible to sidestep...
An illustration of a data folder with a leaking tap (faucet for the Americans).

6 massive government data breaches

5 min read
We’re constantly hearing about data breaches lately⁠—and it’s no wonder, given that 5 billion personal records were exposed last year. While the majority of...
The internet's home icon. But bigger. And red.

9 things you can do with a home server

4 min read
Running your own server at home can be cheap and requires only basic knowledge of the command line. An old laptop can be converted...
An illustration of a block of servers and a checklist on a notepad.

PwC audits ExpressVPN servers to confirm essential privacy protections

2 min read
At ExpressVPN, we take your privacy and security extremely seriously. To best protect our customers, we follow a central principle of never storing any...
The logos of the eight apps featured in this listicle.

8 apps to protect your privacy online

4 min read
Navigating the privacy minefield that is today’s internet can be a challenge. With cybersecurity incidents like the Equifax hack and China’s brazen targeting of...
An illustration of a laptop with password fields with asterisks. However, in front of the laptop is a hand holding a phone. The phone has open some kind of 2FA app. Nice.

Why should I use two-factor authentication?

4 min read
You might have skipped over your email provider’s prompt: Turn on two-factor authentication. Two-factor authentication, or 2FA, is a secondary security measure for logging into...
An illustration of a phone with a padlock on the screen. In the padlock is a dollar sign!

5 ways to protect your online finances… In the physical world

3 min read
From VPNs to anti-virus software, there is no shortage of precautions to take when protecting your personal banking online. But your financial information can...

Latest Posts

Featured Posts

Live Chat