Tips & tricks

Laptop with a vault door.
2 mins

Defend against online stalkers and doxing

Online stalking, doxing, and cyber-bullying have increased alongside the growth of the internet. But there are ways to protect yourself and your family.
A cloud padlock.
6 mins

How to back up your files and encrypt them

Choose the best backup method for you. Keep your data safe and accessible with these tips.
An envelope with a lock on it.
6 mins

How to improve your email security

No matter if it’s private communication or business, your emails contain practically everything there is to know about you. From your emails, anyone can learn...
A shield at the top of a ladder graph.
3 mins

Here are the skills you need for a career in cybersecurity

So you want to get into cybersecurity? Here are the skills and certifications that could help land your next job.
Mask with a smiley face.
2 mins

Face masks do help evade facial recognition tech—for now

A study by the U.S. government found that even some highly accurate algorithms failed to match photos of masked individuals to their pictures up to 50% of the time.
An illustratin of a woman juglging different faces.
10 mins

How (and why) to keep multiple online identities separate

To keep an online persona separate from, and unconnected to, a legal identity, it’s important to understand which identifiers are commonly used to de-anonymize a person.
Wrapping around a hexagonal bar.
6 mins

Modern-day encryption has ancient cryptography beginnings

How to communicate privately has fascinated mathematicians for millennia, possibly as far back as ancient Egypt. Greek strategists would often make use of simple...
Laptop with a brick wall.
3 mins

Here’s how firewalls work

In engineering and architecture, firewalls will stop the spread of the flames and contain the damage. Server firewalls follow the same rules.
A collage of images related to mobile devices, e.g.: a Sim card and a USB socket.
1 min

Infographic: The complete mobile security guide in pictures

This visual guide covers mobile security tips, tricks, and best practices and will help secure your phone from the most determined of hackers.
Globe symbols on the letter D.
6 mins

Deep Web vs. Dark Web: They’re not the same thing

These terms are often used interchangeably, but they’re two distinct concepts.
1 min
1 min

Demo Canva and Typeform Shortcode

3 mins
3 mins
4 mins
1 min

Featured Posts

1 min
2 mins
1 min
3 mins

ExpressVPN is proudly supporting

  • logo_1
  • logo_2
  • logo_3
  • logo_4
Need help? Chat with us!

Live chat

Online

This site is registered on wpml.org as a development site.