Cut the cord: We compare 7 live TV streaming services
The trend of ditching cable TV for online streaming services is in full force, and for good reason: It’s cheaper, more convenient, and gives...
What is an e-signature, and how does it work?
If you’ve recently signed a new job contract, finalized the lease on an apartment, or confirmed a loan online, chances are you’ve used an...
Tech that can spy on our brains is coming
Almost ten years ago, Facebook launched its facial recognition tool, which could identify people in photos uploaded onto the platform. Since then, we have...
Would you trade your privacy for free apps? Some don’t have a choice.
Every time you grant an app permission to access your contacts or listen to your microphone, you’re giving the app developer carte blanche to...
Facebook’s cryptocurrency has governments scrambling
There are over 2,000 cryptocurrencies, tokens, and blockchain instruments commonly traded on more than 250 platforms around the world. Some of these currencies are...
What is spyware and how do I remove it?
Identity theft affected nearly 15 million Americans last year, racking up 4 billion USD in losses. And if you were one of the victims,...
How to create a VPN
A virtual private network (VPN) helps you protect your browsing data from internet service providers (ISPs). It can also help you disguise your IP...
4 new cybersecurity threats in 2019
Cybersecurity threats continue to evolve, and with more consumers making transactions online, you can be sure that hackers aren’t far away.
Announcing the winner of the 2019 Future of Privacy Scholarship
NOTE: This post was originally published on October 25, 2019
We are excited to announce the winner of the ExpressVPN Future of Privacy Scholarship 2019:...
Infographic: The rise of facial recognition in airports
In a recent post, we spotlighted the growing use of face scans as a form of identification in airports, especially in the U.S. Here,...