A comparison of two-factor authentication methods: Which is best for you?
Two-factor authentication makes it impossible for hackers to break into your accounts by brute-force and even protects you if the hackers get your password....
I’m sorry, Dave. I’m afraid I can’t do that: When virtual assistants go very,...
The Wall Street Journal estimates that one million IoT devices were recently used by hackers to carry out a glut of DDoS attacks.
But it’s...
9 women tech activists to follow on Twitter
Hi! I wanted to share my favorite women tech activists to follow on Twitter.
These women all work to keep the internet open and our...
The EU want to tax Hyperlinks. Sign the Save the Link petition to stop...
The European Commission (EC) has repeatedly attempted to create a hyperlink tax. The tax would work similarly to the fee a radio station pays...
How to completely disappear online in 4 easy steps
Without protection, we quickly become transparent online. Law enforcement agencies, corporations, advertisers and even our peers can see every step we take online.
Fortunately, moving...
Take our quiz: Cybersecurity heroes
How much do you know about the big hitters of internet freedom, privacy, and security? Take our quiz to find out!
Who can see your data when you visit a non-encrypted HTTP site?
Using a VPN is good practice for every type of connection, but can be particularly useful when browsing unsecured HTTP websites.
Unhackable notifications: It’s easy to encrypt Facebook with a PGP key
Your Facebook account is valuable. It contains private chats, a list of your personal connections, and, if you use the Messenger app to send...
ExpressVPN’s top 10 blogs of 2016
NOTE: This post was originally published on January 27, 2017
ExpressVPN put out more content in 2016 than any year previously. Here's the best of...
Five BIG information security predictions for 2017
A year ago ExpressVPN made some predictions about what might happen in 2016. Some of these bold prophecies turned out to be correct, others...