An illustration of a large green question mark. Inside the question mark, there is a stream of letters and numbers to symbolize code (like they did in the Matrix).
3 mins

Why do I need a VPN?

A VPN is a clever bit of software that masks the IP address of any device you install it on. In simple terms: When you...
A google shopping cart with the Gmail logo inside the cart.
2 mins

Google is using Gmail to track your purchases. No one knows why.

For almost six years, Google has extracted and stored all purchases, bookings, and subscriptions from your Gmail account. It’s not clear why Google wants...
Facial recognition scan with a question mark on the face.
3 mins

The fight for your face: The battles deciding the fate of facial recognition

This post was originally published on May 29, 2019. Last week, San Francisco became the first city in the U.S. to ban government agencies from...
The ExpressVPN logo with a green tick.
1 min

The all-new ExpressVPN browser extension is here!

NOTE: This post was originally published on May 27, 2019 For older versions of the ExpressVPN browser extension, click here. Incredible news! We’ve given the ExpressVPN...
Mobile phone with an unlocked and locked icon on either side of a yellow line on the floor.
3 mins

Worried your devices will get confiscated at the border? Here’s what you can do

There is growing evidence to suggest that border security agents are taking greater steps to intrude into our daily lives. Just last year, customs...
An illustration of a desktop computer with a house roof.
5 mins

How to set up your own home server

This guide requires you to use the command line interface, or CLI, and an SSH client. SSH (Secure Shell) is a popular tool to...
A red background with white text. The text says "10th anniversary".
2 mins

ExpressVPN is turning 10!

Ten years is a lifetime in the tech world. We’ve been around since the days when it was still considered dodgy to find a...
What does incognito mode actually protect against?
6 mins

What doesn’t incognito mode protect against?

Among many other techniques, websites can use cookies to track your browsing history, which may also reveal your online habits. Beyond the use of cookies,...
An illustration of a scrap of paper with a username and password field on it. But get this! It's on a fishing hook! Lol.
3 mins

What is a phishing attack?

Phishing is by far the most common “hack” used to steal passwords, take over accounts, and enter systems without authorization. It is mostly a...
4 mins

6 common misconceptions about passwords

We all need passwords. They are by far the most used form of authentication, not only on the internet but also on the telephone,...
1 min
1 min

Demo Canva and Typeform Shortcode

3 mins
3 mins
4 mins
1 min

Featured Posts

3 mins
3 mins

DNS hijacking explained

5 mins
3 mins
7 mins

ExpressVPN is proudly supporting

  • logo_1
  • logo_2
  • logo_3
  • logo_4
Need help? Chat with us!

Live chat

Online

This site is registered on wpml.org as a development site.