-
Guide: When and how to reset your router
We do not normally give our home Wi-Fi router much attention after we set it up—until our internet starts acting up. Regardless of the type of issue you are facing, a router reset could work as a qu...
-
What is smishing? Spot & prevent SMS phishing scams
Imagine receiving a text message from your bank, warning you of suspicious activity on your account. The message urges you to click a link to verify your identity immediately. Panic sets in, and witho...
-
How to hide your sensitive pictures
Everyone has the right to take a naked selfie every once in a while. A survey found that 76% of Americans (both men and women) between the ages of 18 and 24 have sent nudes. But sexting isn’t just f...
-
3 browsers that block third-party cookies by default
With the sheer amount of information that can be extracted from your internet use, having a privacy-oriented browser has become essential to protecting your internet activity—and bigger browsers are...
-
7 technologies that ruin everything
The internet lets us do extraordinary things, like translate a physical menu just by scanning it with our phones, or identify planes flying overhead and ships on the horizon. Amid all the convenienc...
-
Top cloud services to store photos online (free and paid)
Google Photos became hugely popular when it announced free, unlimited photo uploads three years ago. As of June 1, 2021, however, that deal no longer exists. What is Google Photos’ new storage polic...
-
Signs that your child is being cyberbullied
A main part of the job of a parent is to keep your children safe. It might seem difficult to always know where they are and who they’re interacting with in person—but when it comes to monitoring t...
-
Online privacy and safety for the LGBTQ+ community
The reality of this world is that those who are LGBTQ+ often have more at stake in protecting their privacy and safety than those who aren’t. This is the unfun part of pride, for the community and i...
-
Cybersecurity lessons: Monitoring password manager activity
Editor's note: This is the first post in our series for cybersecurity professionals and hobbyists, written by Cherlynn C., a threat hunter on ExpressVPN's cybersecurity team. Password managers have be...
-
How to wipe your iPhone or Android before selling it
Purchasing a secondhand or refurbished smartphone is a great way to save money. In fact, sales for used phones have increased steadily over the past few years with numbers projected to grow to over 35...
Tips & tricks
