Internet security

A laptop with a safe door halfway open.

Defend against online stalkers and doxing

2 min read
Online stalking, doxing, and cyber-bullying have increased alongside the growth of the internet. But there are ways to protect yourself and your family.
Satellite internet hacked by researcher

A researcher hacked satellite internet connections with $300 equipment

2 min read
A British Ph.D. student has demonstrated how easy it is to read communications transmitted by satellites across the globe.
A cloud padlock.

How to back up your files and encrypt them

6 min read
Choose the best backup method for you. Keep your data safe and accessible with these tips.
An envelope with a lock on it.

How to improve your email security

6 min read
No matter if it’s private communication or business, your emails contain practically everything there is to know about you. From your emails, anyone can learn...
An illustratin of a woman juglging different faces.

How (and why) to keep multiple online identities separate

10 min read
To keep an online persona separate from, and unconnected to, a legal identity, it’s important to understand which identifiers are commonly used to de-anonymize a person.
The White House has secretly granted the CIA sweeping powers to conduct cyberattacks.

The CIA was secretly granted much more freedom to carry out cyberattacks

2 min read
Since 2018, the agency has been permitted to approve its own operations, no longer needing White House approval.
An illustration of an old cipher.

Modern-day encryption has ancient cryptography beginnings

6 min read
How to communicate privately has fascinated mathematicians for millennia, possibly as far back as ancient Egypt. Greek strategists would often make use of simple...
A laptop with a brick wall on the screen.

Here’s how firewalls work

3 min read
In engineering and architecture, firewalls will stop the spread of the flames and contain the damage. Server firewalls follow the same rules.
A collage of images related to mobile devices, e.g.: a Sim card and a USB socket.

Infographic: The complete mobile security guide in pictures

1 min read
This visual guide covers mobile security tips, tricks, and best practices and will help secure your phone from the most determined of hackers.
A magnifying glass over the word "bug".

Here’s how bug bounties improve security

3 min read
Software could be the most complex tool created by humans. While it might still be possible for a single individual to understand all the...
A bug under a microscope.

ExpressVPN launches a bug-bounty program hosted by Bugcrowd

2 min read
We encourage security researchers to look for vulnerabilities in our apps, website, servers, and all other ExpressVPN assets.
A presumably cyber secure padlock.

What is cybersecurity and why is it important?

13 min read
As the internet economy broadens, it’s more important than ever to safeguard critical information from nefarious entities.

Latest Posts

Featured Posts

Need help? Chat with us!