Latest Posts

Filter Posts

Clear all filters
A collage of images related to mobile devices, e.g.: a Sim card and a USB socket.
1 min

Infographic: The complete mobile security guide in pictures

This visual guide covers mobile security tips, tricks, and best practices and will help secure your phone from the most determined of hackers.
Globe symbols on the letter D.
6 mins

Deep Web vs. Dark Web: They’re not the same thing

These terms are often used interchangeably, but they’re two distinct concepts.
Statue of Liberty torch with a hand reaching down.
5 mins

The U.S. Senate will vote on a bill that might eradicate...

The widely-criticized EARN IT Bill, that might eradicate end-to-end encryption, is now up for voting on the U.S. Senate.
Magnifying glass over code.
3 mins

Here’s how bug bounties improve security

Software could be the most complex tool created by humans. While it might still be possible for a single...
EFF Atlas of Surveillance logo.
2 mins

Three things we learned from the EFF’s Atlas of Surveillance

Wonder what sort of surveillance your city has? There’s a map for that. The Electronic Frontier Foundation (EFF) has launched...
A bug under a microscope.
2 mins

ExpressVPN launches a bug-bounty program hosted by Bugcrowd

We encourage security researchers to look for vulnerabilities in our apps, website, servers, and all other ExpressVPN assets.
Padlock surrounded by keys.
13 mins

What is cybersecurity and why is it important?

As the internet economy broadens, it’s more important than ever to safeguard critical information from nefarious entities.
A broken Open Technology Fund logo.
3 mins

The U.S. wants to stop funding open-source projects. Here’s why that’s...

You may not have heard of the Open Technology Fund (OTF), but you’ve probably used tools that have gotten...
A laptop wearing an eyemask with a dollar sign on it.
3 mins

Staying private and anonymous online is in your best financial interests

Retailers will offer different prices on goods and services depending on visitor browsing habits and physical location.
2 mins

In a possible first, facial recognition has led to a wrongful...

What the arrest of Robert Julian-Borchak Williams in Michigan shows about the use of facial recognition technology by law enforcement.
1 min
1 min

Demo Canva and Typeform Shortcode

3 mins
3 mins
4 mins
1 min

Featured Posts

2 mins
3 mins
12 mins
3 mins

ExpressVPN is proudly supporting

  • logo_1
  • logo_2
  • logo_3
  • logo_4
Need help? Chat with us!

Live chat

Online

This site is registered on wpml.org as a development site.