-
Four ways to get smart about smartwatch security
Smartwatches are swell devices for those looking to combine wearable chic with next-level functionality. They track your health, remind you of your meetings, and—naturally—tell the time. And like ...
-
What is OPSEC, and why do you need it?
Keeping prying eyes away from your plans, data, and conversations is hard work. Attackers sift through scraps of information, link them together, and build a surprisingly detailed picture of you or yo...
-
ExpressVPN's 6 big data security predictions for 2016: Which ones came true?
In January, ExpressVPN made some predictions about what might happen with information security during 2016. Were the predictions correct? Let’s review and see what actually happened. #1: Hackers wil...
-
What is the Internet of Things?
The Internet of Things (IoT) contains everything that connects to the internet. It describes the internet-able nature of modern physical devices, vehicles, and buildings. You may also have heard of Io...
-
9 reasons you need a VPN at home in 2025
A VPN, or virtual private network, is an essential privacy tool for your computer, phone, tablet, or any device that connects to the internet. But you may wonder why using a VPN is so important and wh...
-
Unhackable notifications: It's easy to encrypt Facebook with a PGP key
This post was originally published on February 10, 2017. Your Facebook account is valuable. It contains private chats, a list of your personal connections, and, if you use the Messenger app to send mo...
-
Can you completely delete yourself from the internet?
With the real possibility of personal information cropping up all over the internet, it can be hard to ensure all traces of you are gone. Here are a few steps you can try on your journey to be more pr...
-
9 women tech activists to follow on Twitter
Hi! I wanted to share my favorite women tech activists to follow on Twitter. These women all work to keep the internet open and our online communications private and secure while inspiring us with the...
-
I'm sorry, Dave. I'm afraid I can't do that: When virtual assistants go very, very wrong
The Wall Street Journal estimates that one million IoT devices were recently used by hackers to carry out a glut of DDoS attacks. But it’s not just hackers you have to worry about. The Internet of T...
-
A comparison of two-factor authentication methods: Which is best for you?
Two-factor authentication makes it impossible for hackers to break into your accounts by brute-force and even protects you if the hackers get your password. It can even help lock down your account if ...
Tips & tricks
