Filter Posts
Infographic: The complete mobile security guide in pictures
This visual guide covers mobile security tips, tricks, and best practices and will help secure your phone from the most determined of hackers.
Deep Web vs. Dark Web: They’re not the same thing
These terms are often used interchangeably, but they’re two distinct concepts.
The U.S. Senate will vote on a bill that might eradicate...
The widely-criticized EARN IT Bill, that might eradicate end-to-end encryption, is now up for voting on the U.S. Senate.
Here’s how bug bounties improve security
Software could be the most complex tool created by humans. While it might still be possible for a single...
Three things we learned from the EFF’s Atlas of Surveillance
Wonder what sort of surveillance your city has? There’s a map for that.
The Electronic Frontier Foundation (EFF) has launched...
ExpressVPN launches a bug-bounty program hosted by Bugcrowd
We encourage security researchers to look for vulnerabilities in our apps, website, servers, and all other ExpressVPN assets.
What is cybersecurity and why is it important?
As the internet economy broadens, it’s more important than ever to safeguard critical information from nefarious entities.
The U.S. wants to stop funding open-source projects. Here’s why that’s...
You may not have heard of the Open Technology Fund (OTF), but you’ve probably used tools that have gotten...
Staying private and anonymous online is in your best financial interests
Retailers will offer different prices on goods and services depending on visitor browsing habits and physical location.
In a possible first, facial recognition has led to a wrongful...
What the arrest of Robert Julian-Borchak Williams in Michigan shows about the use of facial recognition technology by law enforcement.