ExpressVPN blog
Your destination for privacy news, how-to guides, and the latest on our VPN tech
Latest Posts
-
Twofish encryption: What it is and why it matters
Twofish is a secure, efficient, and flexible block cipher created for the Advanced Encryption Standard (AES) competition run by the U.S. National Institute of Standards and Technology (NIST) in the la...
-
Which email attachments are safe to open?
Email attachments are a common way scammers try to install malware on your device or redirect you to a fake login page. Whether an email attachment is safe to open or not depends more on who sent it a...
-
What you need to know about adversary-in-the-middle (AiTM) attacks
Adversary-in-the-middle (AiTM) attacks are a growing threat for large organizations because they can often monitor and record employees’ online communications without them knowing or take over their...
Featured
See allFeatured Video
-
Top 10 video games that will change how you view privacy
https://www.youtube.com/watch?v=7uOfHGT5p4w If you love online gaming and are interested in privacy, check out these video games that involve hacking, cybersecurity, and surveillance. Not only ...