Internet security

6 common misconceptions about passwords

4 min read
We all need passwords. They are by far the most used form of authentication, not only on the internet but also on the telephone,...
Hand holding a hard drive over a trash can.

Introducing TrustedServer: Why ExpressVPN is making VPN-server hard drives obsolete

4 min read
At ExpressVPN, we know users count on us to protect their privacy and security, and we take that responsibility seriously. That’s why we never...
Laptop with a green padlock with a dollar sign on it.

Protect your online banking

5 min read
It should require no further explanation why our online banking details are important. We keep our money there, and if our accounts were to...
The new ExpressVPN app, shown connected.

Best ever ExpressVPN app available on all major devices

1 min read
We’ve given the ExpressVPN app a complete overhaul! The latest version has a brand new interface and comes bundled with a host of killer...
A crowd hold their phones aloft.

The most secure messaging apps in 2019

6 min read
From WhatsApp to Snapchat, messaging apps provide a free and easy service to communicate with friends, family, and co-workers. Without encryption, however, private messages could...
Two speech bubbles overlapping with a lock in the overlap.

EFF wants Facebook and 8 other giants to #FixItAlready. We asked what that means.

6 min read
Perhaps the worst aspect of the privacy and security issues plaguing the tech we use every day is that they seem completely preventable. Why hasn’t Twitter...
Horizontal list of privacy browsers and logos.

Ranked: Security and privacy for the most popular web browsers in 2019

15 min read
In a listicle world where even the trivial is quantified, judged, and graded, let’s rank something important for a change: Which web browsers are...
Massive housing leak exposed buyer documents

An unprotected server leaked 24 million sensitive housing documents not once but twice

3 min read
If you live in the U.S. and bought a house sometime over the last decade, your information may be at risk. According to TechCrunch,...
An illustration of a laptop held by puppet strings.

What are botnets, and how do you protect against them?

2 min read
Botnets are large networks of hijacked devices (robots) that can be remotely controlled by their creator. Mainly run for profit by criminal organizations, botnets can,...
The logos of Facebook Messenger, Instagram, and WhatsApp linked together.

Could Facebook’s messenger merger signal dark days for WhatsApp users?

4 min read
Facebook founder Mark Zuckerberg recently announced plans to merge his three dominant messaging services: Instagram, Facebook Messenger, and WhatsApp. The goal, according to Facebook,...

Latest Posts

Featured Posts

Live Chat