Posts by category
- Category: Digital freedom
- Join ExpressVPN at RightsCon 2023
- What is jailbreaking on iPhone?
- How to use technology in the classroom: benefits and impact
- Will AI bots replace lawyers?
- AI-generated art: What is it, and how does it work?
- 30 biggest tech companies in the world 2023 (full list)
- Ranked: Celebrities most associated with fake news
- Deep web vs. dark web: What’s the difference?
- Should you keep your VPN on all the time?
- Why expats need a VPN in 2023
- What is Web3?
- Why do I need a VPN in 2023?
- How to permanently delete your Skype account
- Safety resources: Stay secure amid oppression
- Australia’s proposed ‘anti-troll’ law will erode digital freedom
- It’s shockingly easy for someone to get your Instagram account banned
- 5 times art was used to avoid censorship
- Q&A with wolfSSL, the team behind Lightway’s cryptography
- Not just a game: How Minecraft fights for digital freedom
- Is this attack a hack… or hacktivism?
- Q&A: Alex Gladstein on smuggling forbidden media via USB sticks
- 4 common VPN questions—answered in emojis
- Machines are learning, and they know a lot about you
- 7 technologies that ruin everything
- Will your iPhone replace your passport or ID card?
- The rise of telehealth: What it means for patient privacy
- Cypherpunks: Pioneers of online privacy
- Taking an exam? First, install surveillance software
- Can we govern Big Tech on a global scale?
- Tests, shots, apps: The invasive new world of travel
- Q&A with surveillance critic Albert Fox Cahn
- Big Tech censoring you? Try a distributed social network
- What does Big Tech know about you? Find out
- 1 year on: As Covid-19 raged, our privacy slid
- Bossware: How remote-work tools can be used to spy on you
- What is a digital footprint and how can I manage it?
- Free and open-source software (FOSS): Pros and cons for security
- All in your head: Creating a Bitcoin ‘brainwallet’ with Diceware
- Link tax: How countries are forcing Big Tech to pay for the news
- Free cybersecurity courses for protection and education
- Bitcoin paper wallets: Taking your Bitcoin security offline
- How to survive an internet shutdown
- Free cyber safety resources for kids
- Splinternet: From one internet to multiple webs
- Working remotely? You can live in these countries on remote-work visas
- Countries with SIM-card registration laws
- OONI, an app that measures how much of your internet is censored
- What does a VPN hide?
- Tor outage: How a major attack felled the onion network
- Top 21 .onion websites from the depths of the dark web
- Upgrading Bitcoin, Part 1: The pitfalls of hard forks and soft forks
- Tech resources for leaving a cult
- Download Android apps anonymously via the Aurora Store
- Lightning Network: A better way to pay with Bitcoin
- 5 ways Amazon spies on you (even if you’re not a customer)
- Ditch Android (and Google) and install LineageOS
- Voters chose their digital rights on Election Day
- 20 tech giants could face stricter rules in the EU. Will this hurt innovation?
- Limiting the president’s power to shut down the internet
- We need more than surveillance to prevent police violence
- Quick biography: Chelsea Manning
- Quick biography: Julian Assange
- Facebook: Our future in Europe is unclear
- Surveillance capitalism: How every ‘like’ adds to your data for sale
- The social contract of the internet is under threat. That’s a problem
- Interview: Encryption expert Riana Pfefferkorn on the erosion of online free speech
- Lockdowns highlight the need to repair devices ourselves
- To combat fake pandemic news, countries beef up censorship
- ExpressVPN survey reveals streaming is the most popular entertainment for Americans in lockdown
- Not so (artificially) intelligent: 8 times machine learning got it wrong
- What is cybertorture? How our minds are vulnerable to online experiences
- Maybe it’s time to dump social media, just for a little bit
- What is GDPR and how do you obtain GDPR compliance?
- Internet censorship: What is it, and how does it happen?
- The EU wants you to have the ‘right to repair’ your electronic devices
- Why isn’t Big Tech embraced in its own backyard?
- 8 anti-spam techniques your email uses to prevent spam
- Organizations push Google for tighter control over bloatware
- Global Internet and Social Media Censorship Report, 2020
- Google’s smart city project: A privacy hot button
- Get the ExpressVPN Black Friday and Cyber Monday deal
- Facebook’s cryptocurrency has governments scrambling
- How to create a VPN
- Why Facebook is the tool of choice for government manipulation
- Opt out of a face scan at the airport? Easier said than done.
- Instead of freeing us, the internet is making us conform
- Is your car spying on you?
- Want to trade crypto? Here are the top 5 exchanges to try your hand
- Interview: Meet the person protecting human rights activists amid mass surveillance
- What is a Bitcoin node and who needs one?
- Staying private online could save you big bucks
- 7 privacy and security takeaways in Mary Meeker’s Internet Trends Report
- How to set up your own home server
- ExpressVPN is turning 10!
- This congressman wants to turn Taiwan into a blockchain island. We asked him how.
- UK’s Online Harms White Paper casts a cloud on free speech
- Get ‘Smarter Every Day’ with ExpressVPN: How to win the online war for your eyeballs
- UK users unable to disconnect from EU server location
- EU approves controversial new copyright directive
- India proposes mass surveillance measures in new IT bill
- Laws that threaten internet freedom around the world
- ExpressVPN survey: Americans doubt they’ll get more power over their data
- The 9 best ExpressVPN blogs of 2018
- 5 famous whistleblowers who risked everything
- ExpressVPN survey: Nearly half of Americans have smart home devices on holiday shopping list
- ExpressVPN survey: Most Americans distrust voting systems, news and social media
- Why encryption is vital in free societies
- Facial swapping software is now open-source
- EU approves “link tax” and “censorship machines” for a final vote
- California passes “the strongest net neutrality standards in the nation”
- Access granted: How to use Southwest Airlines overseas
- Uganda is now taxing its citizens for access to social media
- Eight women in Bitcoin you should follow on Twitter
- Net neutrality is important, and we need to fight for it
- The privacy cost of consumer DNA profiling
- Your secrets are your own: In defense of privacy
- 5 common VPN misconceptions
- ExpressVPN’s all encompassing, jargon-busting Bitcoin glossary
- Online shopping with a VPN: Find deals and protect yourself this Christmas
- 10 ways a VPN for games improves your gaming
- How to watch 2018 FIFA World Cup with a VPN | Live Streaming
- Net neutrality: what the repeal means and how a VPN can help
- How to make a small server for your home
- What makes a cryptocurrency Bitcoin?
- 5 fashion items you’ll need to fight a surveillance state
- Looking for the best tech podcasts? Here are ExpressVPN’s favorites
- ExpressVPN publishes the ultimate Bitcoin security eBook
- Which of ExpressVPN’s 2017 predictions came true? And what’s next for 2018?
- Taking your first steps on the Lightning Network
- DuckDuckGo at 10: Looking ahead with CEO Gabriel Weinberg
- Which countries do the Dutch join with their new mass surveillance law?
- 3 things the U.S. could learn from India’s new net neutrality rules
- ExpressVPN just added two new Australian VPN locations!
- 5 biggest scams in history
- Five myths that the NSA wants you to believe about FISA 702
- 7 times the internet was gloriously ridiculous
- iPhone vs. Bitcoin: Over the years, how many iPhones could you buy for 1 Bitcoin?
- A great scam or a good investment: What is an ICO?
- Q&A with TAILS on privacy and being labeled extremists by the NSA
- Whistleblowing guide: Why you should remove the metadata
- Dystopian data: How my search history cost me my job
- How banks or governments could wipe Bitcoin off the face of the planet
- Apple removes VPN Apps from China App Store
- OpenMedia launch new Message-your-MEP tool to fight link tax
- Whistleblowing guide: How to stay anonymous when blowing the whistle
- Whistleblowing guide: Blowing the whistle is tough
- Are we living in an Orwellian nightmare? Did 1984 predict real world surveillance?
- Get involved with OpenMedia’s campaigns to make the internet a better place
- The EU want to tax Hyperlinks. Sign the Save the Link petition to stop them!
- Take our quiz: Cybersecurity heroes
- Get the red carpet treatment: Stream the 2017 Oscars Online with a VPN
- Five BIG information security predictions for 2017
- 5 ways the Internet of Things could kill you
- Some good things did happen in 2016
- How to watch the top december English Premier League games
- How to watch the 2016 U.S. Presidential Election online
- Better gaming with a Minecraft VPN
- Hyperlinks made the internet fabulous and they must not be taxed
- How to watch the top November English Premier League games
- Edward Snowden, Captain America, and privacy in the reel world
- The incredible Battlefield 1 is here: Play it earlier, better, and faster with ExpressVPN
- ExpressVPN proudly announces the winners of the first annual Future of Privacy Scholarship!
- How to watch the top English Premier League games in October
- Why the world must demand a decentralized internet
- Where to watch the stunning 2016 F1 season online
- How to watch the Manchester Derby and other top games in September
- How to get unbanned from Omegle (or any other website)
- ExpressVPN’s 2016-17 college football primer – part 2
- ExpressVPN’s 2016-17 college football primer – part 1
- Rejoice! The 2016-17 English Premier League is here!
- NBC slammed by viewers for delaying Olympic streams
- ExpressVPN is ready to rock against the TPP – are you?
- Tor crusader Chuck McAndrew discusses privacy, freedom with ExpressVPN
- The perpetually futile battle of Brazil vs WhatsApp
- Win up to $2,500 in scholarship money from ExpressVPN!
- The obvious and horrifying truth of Star Trek no one talks about
- The future of smart cities: Utopian dream or dystopian nightmare?
- Prizes for privacy: The ExpressVPN Future of Privacy Scholarship
- If the debate over digital privacy were a TV show, this is what it would look like
- Streaming sports? Use a VPN for added security
- 5 ways online services manipulate you
- How the EU made life harder for Netflix
- How I traveled the world with a VPN and watched TV
- The benefits of a VPN for Black Desert Online
- The absolute best places to use a VPN
- What is a transparent proxy?
- Is virtual reality just another advertisement in disguise?
- ExpressVPN stands with Fight for the Future
- A brief history of Anonymous
- Court case forces Apple to hack themselves
- Meet the man who wants to save encryption
- The Snowden Effect: 4 things we’ve learned since the privacy bubble exploded
- How to use a VPN to watch Super Bowl 50
- We worked out the exact day Lou Reed had a perfect day
- Online privacy is why Sweden wins the internet
- How to stop the Kazakhstan government from intercepting your internet traffic
- Nothing to hide? Speak for yourself.
- Use a VPN and save up to 50% on car rentals. We tried it!
- UK’s new mass surveillance bill is the worst yet
- 31 Internet safety memes everyone should see
- Fight the TPP with a VPN
- Come to the dark web… it’s a little safer now
- Encryption helps everyone, including criminals, and that’s O.K.
- 3 non-profits that fight for your digital rights
- Google in talks with privacy regulators over ‘right to be forgotten’
- Protecting your digital rights: Who is Access?
- Renew or repeal? Spy law battle heats up on Capitol Hill
- Going dark: New Australian law spurs VPN interest
- Why we think the Australian Data Retention Law is a terrible idea
- Breaking borders: Canadian spy agency tracks users worldwide
- Want to watch “The Interview”? Watch out!
- Your data, your rules: The encryption of everything
- ExpressVPN supports National Cyber Security Awareness Month 2014
- ExpressVPN protects you from password sniffing programs
- 24/7 live chat support from ExpressVPN
- Top 3 reasons to get a VPN
- Category: Digital Security Lab
- Category: ExpressVPN news
- ExpressVPN celebrates Napoli’s Scudetto victory with new Naples server
- Independent audit confirms security of Lightway for the second time
- We’ve reached 4 million active subscribers!
- Making our Aircove router better every day: 6 new features
- Cure53 audits verify security of ExpressVPN Keys password manager
- ExpressVPN validates security of its mobile apps via two external audits
- Announcing ExpressVPN’s 2022 scholarship winner
- ExpressVPN confirms security of its desktop apps with 3 new independent audits
- ExpressVPN’s protections examined in 2 new independent audits, by KPMG and Cure53
- New Android app security features give ExpressVPN users even more control
- Cure53 audits ExpressVPN Aircove, confirming the router’s security excellence
- ExpressVPN launches Aircove, a Wi-Fi 6 router with built-in VPN
- ExpressVPN now runs natively on Apple silicon Macs (M1 and M2)
- TrustedServer: Deep dive into the security of our server tech
- ExpressVPN is even faster with new 10Gbps servers
- Rejecting data demands, ExpressVPN removes VPN servers in India
- ExpressVPN launches a free Udemy course on online privacy and security
- Independent audit confirms security of ExpressVPN’s app for Windows
- Helping to keep the internet open in challenging times
- ExpressVPN’s $100,000 bug bounty bonus for VPN server vulnerabilities
- Parallel connections: Our new feature to speed up VPN connection times
- Introducing Threat Manager: Stop apps from tracking you
- Log4Shell’s long-tail impact on your security
- ExpressVPN officially joins Kape Technologies
- Log4j vulnerability: ExpressVPN delivers protection against Log4Shell
- Human rights and the ExpressVPN mission
- Comparing WireGuard and Lightway: 3 reasons we created Lightway
- ExpressVPN survey reveals the extent of Gen Z’s social media fixation
- Announcing ExpressVPN’s 2021 scholarship winner
- Daniel Gericke and ExpressVPN – Official Response
- ExpressVPN to join Kape to strengthen push for privacy
- New: Connect to multiple VPN locations on your router
- Lightway: Open-sourced and audited for proven security
- Nokia phones choose ExpressVPN and Spotify as must-have apps
- ExpressVPN for routers: Latest updates and firmware upgrades
- ExpressVPN survey reveals the extent of surveillance on the remote workforce
- ExpressVPN’s Apple privacy labels rated 100% for accuracy
- ExpressVPN receives ioXt certification for security
- Dev blog: A look inside Lightway
- The 2022 ExpressVPN Scholarship is now accepting entries
- Designing the future of ExpressVPN
- A new era for ExpressVPN
- Our new logo, coming to your ExpressVPN app
- ExpressVPN launches new privacy and security features on Android
- New partnership brings ExpressVPN protection to LastPass users
- How ExpressVPN ensures no one can slip malware into your apps
- Introducing Lightway, ExpressVPN’s new protocol for a superior VPN experience
- ExpressVPN adds help guides to its iOS and Android apps
- ExpressVPN and Dynabook (formerly Toshiba) announce global partnership
- ExpressVPN adds dark mode to Chrome and Firefox browser extensions
- ExpressVPN jointly launches industry initiative for internet safety
- ExpressVPN and HP provide VPN protection to PC users
- Why you can’t judge a VPN by its server count
- Mac joins other ExpressVPN apps with multiple languages
- ExpressVPN tops Comparitech’s speed test
- PwC audits ExpressVPN servers to confirm essential privacy protections
- Now on ExpressVPN: Connect 5 devices simultaneously
- ExpressVPN browser extension: Latest updates and software upgrades
- Introducing TrustedServer: Why ExpressVPN is making VPN-server hard drives obsolete
- Best ever ExpressVPN app available on all major devices
- The latest ExpressVPN app for Windows is our best yet
- ExpressVPN Android app: Latest updates and software upgrades
- ExpressVPN publishes outside security audit and open-sources browser extension
- ExpressVPN iOS app: Latest updates and software upgrades
- Marriott loses the data of half a billion customers
- ExpressVPN Black Friday discount
- ExpressVPN’s new-look blog!
- What is ExpressVPN’s Smart Location and when should you use it?
- How ExpressVPN keeps its web servers patched and secure
- Browse more securely with EFF’s HTTPS Everywhere and ExpressVPN
- ExpressVPN Bug Bounty rewards
- ExpressVPN 6.6.1 for Windows has all the best features
- ExpressVPN supports more Linux distributions than ever
- ExpressVPN 1.4 for Linux is available now: Download today!
- This is what you’ve been waiting for: ExpressVPN on Amazon Fire TV Stick and Android TV
- ExpressVPN security updates to protect systems from Spectre and Meltdown
- BestVPN.com Awards gives ExpressVPN top honors
- Is your VPN protecting your privacy and security? Check for yourself with the new ExpressVPN Leak Testing Tools
- It’s official: ExpressVPN is number 1 for speed
- Download ExpressVPN 6.5.5 for Android today!
- Download ExpressVPN 6.6.7 for iOS today
- What is the WPA2 Wi-Fi Encryption Vulnerability and how does it affect you?
- Technical Overview: Preventing DNS Leaks When Switching Network Interfaces
- ExpressVPN: Better Privacy and Security with Industry-Leading DNS Leak Protection
- Read the ExpressVPN blog on Medium and Google Play Newsstand
- ExpressVPN 6.6.3 for iOS is available to download now!
- Stop the press: ExpressVPN 6.5.1 for Android is here!
- ExpressVPN for iOS 6.5.9 is available and it’s awesome!
- ExpressVPN 6.4.4 for Android is here, and it’s glorious
- Introducing the new ExpressVPN Safari extension for Mac app users
- ExpressVPN app 1.2.0 for Linux is available now!
- ExpressVPN Linux app: Latest updates and software upgrades (1.4.0)
- Download ExpressVPN 6.2.3 for Windows today
- How to use Ansible Variables and Vaults
- ExpressVPN’s “License Expired” app error: What actually happened?
- How ExpressVPN authenticates its apps
- The facts about the OSTIF OpenVPN source code audit
- 4 reasons why you should upgrade to ExpressVPN 6.1 for Windows today
- Your YouTube history exposed: Researcher identifies inherent security flaw in video streaming
- Who can see your data when you visit a non-encrypted HTTP site?
- Interview: What makes the ExpressVPN Support Team the best in the business?
- How ExpressVPN apps confirm they’re talking to ExpressVPN servers
- Join the app for routers revolution for complete home protection
- How IP checkers work and why they’re sometimes wrong
- Sweet 32 exploits the birthday problem but ExpressVPN won’t be at the party
- ExpressVPN for Linux is here and it’s totally rad!
- Announcing the ExpressVPN app for routers – protect all devices in your home
- Calling all Android users! ExpressVPN 5.0 for Android is now available
- Why there won’t be an ExpressVPN lifetime subscription
- Attention, iOS users: ExpressVPN 5.0.1 is now available and it’s awesome!
- Get started—5 awesome ways to use ExpressVPN
- ExpressVPN 5.0 for Windows is waiting to meet you!
- Presenting ExpressVPN 5.0 for Mac, with a beautiful new look
- ExpressVPN 4.8 for iOS is now available!
- Introducing the ultimate guide to VPN for Canada
- ExpressVPN 4.1 for Windows is now available and it’s a beauty!
- ExpressVPN 4.7 for iOS is now available!
- Attention Android users: ExpressVPN 4.7 for Android is now available!
- ExpressVPN’s Halloween Giveaway – enter to win a frightfully free VPN subscription!
- Disable IPv6 for better VPN protection
- Certificate authority trust breach exposes vulnerability in Internet’s trust hierarchies
- Our Speed Test tells you the fastest VPN server locations
- ExpressVPN and Heartbleed
- Announcing: New lunar VPN server location for April 2014
- New version of ExpressVPN for Windows: v3.112
- Some Data about the Reliability of ExpressVPN Servers
- Try ExpressVPN risk-free with our 30-day money-back guarantee
- Category: Featured
- Q&A with football great Alessandro Renica on Naples’s 3 championships
- How to stream ‘Love Island’ international versions in 2023
- The Flash vs. the fastest internet speeds in the world
- What’s the difference between web browser and search engine?
- Tech Friend: iPhone ‘system data’ is hogging my storage
- How to stay anonymous in online chats
- ChatGPT and privacy: What happens to your personal data?
- Explainer: Utah’s age verification for social media and porn access
- Star Wars Day: Every ‘Star Wars’ movie and show in chronological order
- Best new shows and movies to stream in May 2023
- Popular reality TV shows to watch in May 2023
- Canada’s Online Streaming Act (Bill C-11) explained
- Max: All about HBO and Discovery’s new streaming service
- Best dark web search engines to explore in 2023
- Why does turning it off and on again work?
- Most likely to succeed: A ‘Succession’ prediction ranking
- Tech Friend: Can a VPN limit browser fingerprinting?
- 6 apps the U.S. might ban
- [Quiz] How much is your data worth on the dark web?
- What to do when you accidentally go viral
- The U.S. Restrict Act explained
- Best AirTag alternatives for Android and iPhone
- How to track your own luggage
- A toast to Gordon Moore, an inspiration to human ingenuity
- Disappearing messages on WhatsApp: What is it and how to turn it on?
- 7 examples of the biggest DDoS attacks
- Tech Friend: What makes password managers safe?
- What reality TV shows are Australians watching?
- Where to stream 2023 Oscar winners and nominees
- Q&A: Mark Weinstein, on making social media serve the user again
- 7 new social media apps: What sets them apart?
- Netflix and play: How to unlock Netflix’s free games
- What is a man-in-the-middle (MITM) attack?
- Is your phone listening to you? Why it can and how to stop it
- Q&A: Pippa King, on the fight against surveillance in schools
- How to prevent phishing attacks
- Is Reddit safe?
- What is OPSEC and why do you need it?
- Is it better to use an app or a website?
- How to fix the error ‘OpenAI is not available in your country’?
- How to turn off always-on displays on iPhone and Android
- Google Chrome vs. Firefox: Which is the better browser in 2023?
- Formula One race calendar 2023: 23-race schedule confirmed
- Why you shouldn’t give out your email address
- How to fix lag in FIFA 22 & 23
- What does CAPTCHA mean? (Definition and explanation)
- How to fix ‘ChatGPT is at capacity’ error with a VPN
- Smart devices for the bedroom: A security turn-off
- Tech Friend: How secure is screen casting?
- How to increase download speed on your PC
- What is wardriving
- What is Cryptojacking? Definition and explanation
- What is crypto malware? And how to detect it
- We asked couples in 4 countries about password sharing
- UK survey: 71% have shared passwords with romantic partners
- U.S. survey: 81% have shared passwords with romantic partners
- Flowchart: Which Oscar movie should you watch?
- 7 fastest ways to level up your privacy
- Should you use a free VPN?
- 12 best Google Maps alternatives in 2023
- How to Boost Online Banking Security
- Online dating scams: What to look out for
- How to send an anonymous email
- 15 best YouTube alternative sites and competitors in 2023
- All zombie types in ‘The Last of Us’
- Tech Friend: My VPN location seems to be wrong
- 6 reasons you shouldn’t post photos of your kids online
- How to find and remove malware on your Android device
- What is “Spam Risk” and how do I block these phone calls?
- How to optimize your PC for gaming
- Best TV shows 2022: Our streaming experts’ top picks
- What is bloatware, and how can you remove it?
- How to make information uncensorable online
- Best TV streaming devices 2023
- Is FaceApp safe?
- Tech Friend: If I use Apple devices, should I stick to Apple apps?
- Streaming 2023 calendar: When your favorite shows are coming back
- 2022 streaming gift guide: Something for every couch potato
- Stay prepared with a tech survival kit
- What are passkeys? Here’s the next big sign-in method
- What is a smart city?
- We asked OpenAI’s chatbot to write about its maker
- What is a QR Code?
- 2022 gift guide: Smart home tech for everyone on your list
- How to enjoy any World Cup game
- Samsung lost its Android app-signing key—and didn’t replace it
- Best foreign Christmas movies and series on Netflix
- Introducing Tech Friend, ExpressVPN’s advice column
- What is Predator spyware?
- The 59 best Christmas movies to stream in 2022
- Fortnite Chapter 4: Release date, leaks, and what we know so far
- What is DNS?
- Quiz: Test your World Cup knowledge
- Best Black Friday and Cyber Monday deals 2022
- Best global Black Friday and Cyber Monday deals 2022
- 15 most shocking and exhilarating moments in World Cup history
- The best 2022 holiday specials, Christmas movies, and sports to stream
- Cybersecurity introduction: Everything you need to know
- What do you miss about the old internet?
- What are the differences between HTTP and HTTPS?
- Streaming in 2022: A year of superlatives
- What is data privacy and why is it important?
- 10 signs a shopping website is fake
- ExpressVPN’s Black Friday and Cyber Monday deal 2022 (plus shopping tips)
- OpenSSL’s ‘critical’ vulnerability: What you need to know
- 21 best soccer movies to stream (+ bonus TV shows)
- How to fix Fortnite lag
- Flowchart: What should you stream on Halloween?
- 6 new horror movies to stream for free this Halloween (2022)
- How to spot and avoid fake apps (2023 guide)
- Facebook Marketplace scams: How to spot them and protect yourself
- Metaverses are here: Best virtual spaces for work and play
- 15 best apps for online privacy in 2023 (iOS & Android)
- What is Freenet?
- Explainer: Artificial Intelligence Bill of Rights
- Wi-Fi router logging: What it is, the risks, and how to clear it
- Go analog: 15 ways to embrace digital minimalism
- What is DNS hijacking?
- What are Amazon unauthorized purchase scams?
- Google Chrome vs. Microsoft Edge: Which is better?
- What is eSIM? And how does it work?
- What is a digital bank?
- Stop getting random AirDrops
- Protect yourself from stalkerware apps
- Best tech gear for traveling in 2023
- How to reduce screen time?
- Can you completely delete yourself from the internet?
- The fight against book bans
- What is an evil twin attack?
- Best football movies to stream
- How to detect hidden spy cameras
- What is an SSL stripping attack? And how to prevent it
- How often should you change your passwords?
- 7 ways to stop spam calls and robocalls
- How to find your printer’s IP address
- Infographic: What drives sports streaming in the U.S.?
- How to get free Wi-Fi anywhere in 2023
- How to delete your Spotify account permanently
- Targaryen family tree: From ‘House of the Dragon’ to ‘Game of Thrones’
- Is Ethernet better than Wi-Fi?
- 9 best tech gadgets and apps for college
- What is scareware?
- How to delete your Netflix history
- What can someone do with your IP address?
- Streaming devices with free-trial streaming services
- How to delete your Google account permanently
- Why online marketers need a VPN
- Is hotel Wi-Fi safe?
- ‘OSINT’ yourself: Find all public information about you
- How to spot a deepfake video
- 10 Jane Austen movie adaptations ranked best to worst
- Should you get a burner phone?
- How to boost Wi-Fi signal at home to get faster internet
- What are white hat, gray hat, and black hat hackers?
- Cybersecurity tips for small businesses
- How to stop receiving spam emails
- Quiz: Which rom-com sidekick are you?
- 8 tips for online safety this travel season
- 5 best UFO documentaries to stream
- Secrets we keep from our friends but share with Google
- How to stay safe when shopping online
- How it works: Firewalls explained
- What your ISP sees when you use VPN
- WhatsApp vs. Signal: Which is more secure?
- What is the browser-in-the-browser (BitB) attack?
- Best artificial intelligence movies through the ages
- 5 common apps that put your privacy at risk
- Secure your accounts with the best free authenticator apps
- Survey reveals surveillance fears over the metaverse workplace
- What is doxing, and how to avoid getting doxxed
- 30 UK shows you can stream for free right now
- What are keyloggers, and how do they work?
- What are parental controls, and how to set it up on your devices
- Infographic: Stay safe and private on social media
- Perfect forward secrecy (PFS) explained
- 14 best LGBT movies and shows to watch this Pride Month
- Video: Best ways to store your passwords
- GDPR 4 years on: How data consent changed the internet
- Delete your period tracking apps
- Conti: The most dangerous ransomware gang
- What to do with old phone cases
- Can you find an IP address from an email?
- ‘We’re in!’: Best (and worst) password-hacking scenes in movies and TV
- 7 best gamification apps to level up your life
- Whither Netflix? The top 5 streaming services worth keeping
- So your information is on the dark web. What now?
- How to choose a security question
- Our TikTok series: Explaining VPNs with toddler toys
- Most common passwords around the world 2023
- Video: What does your ISP know about you?
- Why we’d never install a Trusted Root CA on your device
- Apps that can save your life
- Google takes a step to stop puppy scams
- Survival tip: Digitize emergency records on USB
- 32 small ways to improve your relationship with tech
- What is the Marvel Cinematic Multiverse?
- Why anonymous data isn’t as anonymous as you think
- 10 life-enhancing tech products under $30
- Explainer: Lapsus$ hacking group
- Quiz: What is your technological age?
- Static (dedicated) vs. dynamic IP: What’s the difference?
- What is a replay attack? (And how to prevent them)
- Got a new iPhone or Android? Here’s how to transfer data from your old phone
- The metaverse explained: Definition, examples, and how it works
- 5 Android settings to toggle off for your privacy
- 4 ways to hide from drone surveillance
- 14 best (and worst) classic game reboots
- 9 Spotify alternatives for music in 2023
- Are you a good digital citizen?
- Strangest examples of modern media censorship
- 11 best movies about the metaverse
- AirTag, Tile, SmartTag security: Are you being tracked?
- Video: What are the risks of an unsecured router?
- What are bots and how do they work?
- Infographic: Batman villains and their disguises
- Best sports streaming services for 2023
- Our foreign Netflix picks, based on your favorite shows
- After a breakup: Tips to sever your digital ties
- Dating sim games: A funnier way to date
- What to do if your social media account gets hacked
- How to stay safe and private on dating apps: 9 dos and don’ts
- Quick guide to 10 popular kids’ video games
- Flowchart: Which movie should you stream this Valentine’s Day?
- 12 popular U.S. TV shows that are remakes
- 18 best Silicon Valley startup movies and TV shows to stream
- How to lower ping and improve gaming speeds
- What you should do after losing your phone
- Which online payment method is safest?
- How to spot and protect yourself against LinkedIn scams
- Auto app updates: Pros and cons, and how to turn them on
- What is online dating?
- How to delete your Facebook account, Google search history, and more
- Netflix, Facebook, and Instagram, but for kids?
- A dozen final roses: ‘The Bachelor’ by the numbers
- What you should do when deleting an app from your phone
- All about Tor, the Tor Browser, and the Dark Web
- Ultimate guide to mobile security for iPhone and Android devices
- What is ransomware, and how to prevent it?
- 12 best Christmas TV episodes ever
- How to gift Bitcoin or other cryptocurrencies this Christmas
- Flowchart: Which Christmas movie should you stream?
- The safe browsing guide: 21 ways to protect yourself online
- Infographic: 6 tips to safer social media use
- Should you pick up calls from unknown callers?
- How to check if a website is safe: 6 quick tips
- Is Facebook listening to you?
- 4 reasons you need a VPN at home
- Tech safety for survivors of domestic violence
- Should you hide your Wi-Fi network name (SSID) or not?
- The essential crypto glossary: Blockchain terminology explained
- How to stay secure when using public Wi-Fi
- Infographic: 12 tips to level up your cybersecurity
- Data scraping: A (mostly) legal way to harvest your information
- What are biometrics? Is my identity at risk?
- How to set up and use Pretty Good Privacy (PGP)
- Video: How to stay private while shopping in real life
- Invasion of the home robots: Is our privacy safe?
- Price trackers and other tools to find deals this Black Friday
- Why you should care about NFTs
- Explainer: Facebook is shutting down its facial recognition system
- 6 best streaming services for anime fans
- Video: 9 tips for safer online shopping
- Risks of downloading pirated, or ‘cracked,’ software and games
- 6 cybersecurity horror stories to haunt your dreams
- 10 best baseball movies to stream online
- The ultimate Halloween streaming guide
- FTC study: ISPs share far more user data than you’d expect
- How to access the dark web
- Internet surveillance in 5, 9, and 14 eyes countries
- Are we running out of IP addresses? 5 facts to know
- Interactive movies let you decide the plot—and they’re going mainstream
- 7 breaches, hacks, and leaks you might have missed this year
- How to know if your phone has a virus
- 2.4 vs. 5 GHz Wi-Fi: Are you using the right one?
- The internet is safer now—but a VPN is still essential protection
- Guide: Protect your privacy at the workplace
- Eye in the sky: The history of the spy plane
- How to keep your mobile hotspot secure
- Best sites to get free games online
- Cybersecurity’s next frontier: Space
- Guide to Facebook’s new privacy settings
- What is email tracking, and why you should turn it off
- Australia’s ‘hacking’ bill lets police take over a person’s social media
- Tips to safeguard your privacy before a device repair
- 5 times misuse of work email got someone fired
- 8 of the biggest crypto thefts of all time
- 3 easy privacy settings on iPhone you didn’t know about
- 15 niche streaming services: Find the one for you
- How to change sensitive-content settings on social media
- Explainer: Apple’s plans to scan your iPhone photos
- How to stop spam with anonymous email forwarding
- Input lag is a drag on gaming. Here’s how to fix it.
- Marvel Cinematic Universe: Get caught up with our guide
- Privacy, security, and anonymity: What’s the difference?
- Smart borders: Hubs of mass surveillance
- What is Pegasus spyware? And how to protect your phone
- Guide: When and how to reset your router
- The world needs a VPN Emoji
- What are ‘smishing’ attacks, and how to avoid them
- Government hacking: How countries surveil their own citizens
- This symbol could break your phone’s Wi-Fi
- How to hide your sensitive pictures
- 3 browsers that block third-party cookies by default
- Top cloud services to store photos online (free and paid)
- Signs that your child is being cyberbullied
- 13 more surveillance-themed movies and shows
- 5 times military secrets were exposed in apps
- Online privacy and safety for the LGBTQ+ community
- How to wipe your iPhone or Android before selling it
- How to opt out of Amazon Sidewalk and stop sharing internet with neighbors
- How reputation management can help you stay private
- Frightening reality: You can buy ransomware as a service
- When catfish meets crypto scam on dating apps
- Your old phone number is putting you at risk
- How Google Nest Hub sleep sensors monitor from afar
- 60 best free streaming services around the world
- Explainer: iPhone’s new App Tracking Transparency feature
- Privacy flaw found in Google and Apple’s contact-tracing tool
- Here’s what vaccine scams look like
- To log in, just type. How typing biometrics makes life easier
- Guide to data hoarding for the end of the world
- The EU is closer to banning AI mass surveillance
- Is a kid-friendly Instagram possible?
- How to stop DDoS attacks on Xbox
- Google’s tracking cookies are going away. Is that good?
- We’re at the dawn of medical surveillance
- Where to stream 2021 Oscar winners and nominees
- Why is my internet so slow? And how to fix it
- 10 times Facebook violated your privacy
- Tinder will soon offer background checks on your matches
- Back to the office? 7 tips to protect your privacy at work
- Facebook wearables are coming. Would you want them?
- Don’t post your vaccine cards on social media
- Explainer: $5bn lawsuit against Google over Incognito mode
- What your internet service provider knows from your online traffic
- A VPN on your router protects all your home devices
- Ranked: Best (and worst) browsers for privacy in 2023
- Digital vaccination passports are here
- Venmo, Cash App, and PayPal scams: How to stay safe
- How to tell if your webcam has been hacked
- Protecting power grids and water supplies from cyber attacks
- Is your VPN working? Here’s how to test it
- What is Clubhouse, and is it private?
- These mood trackers log your voice, skin, brain waves, and more
- Data ethics: When your public images are used for profit
- How to declutter your phone: Step-by-step guide
- Ways to learn a language online (Tip: Get a VPN)
- Contact-tracing apps: A privacy paradox
- How your car data can be used against you
- Protect your text messages with a password now
- How to protect smart home devices from hacks
- The best messaging apps for privacy and security in 2023
- Top 6 video games that will change how you view privacy
- 5 ways parents can stay smart about children’s privacy
- How to protect your data when you die
- Contact tracing at work: A growing reality
- Four ways to get smart about smartwatch security
- Revive your old computer by installing Linux
- 18 top tips to protect your online privacy in 2023
- Upgrading Bitcoin, Part 2: A challenging process
- Turn your old Android phone into a security camera
- 14 cybersecurity resolutions to stay private in 2023
- Ranked: Top operating systems for security and privacy
- 5 things to do in isolation, whatever your holiday mood
- Why is Facebook fighting Apple’s App Store ‘privacy labels’?
- Top 12 surveillance-themed movies and shows
- New AI tech bodes ill for identity theft, scams, and propaganda
- Why more apps should integrate Tor
- Why hospitals are getting more cyber attacks
- Tips for avoiding scams during the holiday shopping season
- 2021 Gift Guide: Best cybersecurity gifts for privacy protection
- The antitrust case against Google might be good for your privacy
- Delete these now: The worst apps for privacy in 2020
- Biometric data collection around the world
- With a new bill, Canada could get very tough on data privacy
- Canada’s version of the NSA is just as bad
- What is SOCKS5? How do SOCKS proxies work?
- Installing apps on LineageOS for greater privacy
- A less-invasive Covid-19 tracker: Sniffer dogs
- Parents’ guide to the 8 best streaming services for kids
- Data privacy laws by country
- A spying smartwatch highlights kids’ privacy risks
- Best home security camera systems for privacy and security
- What is UPnP?
- Announcing the winner of the 2020 Future of Privacy Scholarship
- Will your vote count? 4 cyber threats on Election Day
- Risk of biometric payments: You can’t reset your fingerprint
- What is a content delivery network? Find out the benefits and risks of CDNs
- How to turn off browsing history
- What your mental health app reveals to big tech
- What is metadata and what does it mean?
- 7 countries are calling for access to your private messages
- A huge drug bust raises questions about dark web anonymity
- Why UK police love Uber: The company shares its data with them
- A ransomware attack on a hospital has caused a woman’s death
- 5 ways to hide your browsing history from ISPs
- How a Tesla employee saved the company from a ransomware attack
- Yes, your e-reader tracks you, too. Here’s what to do about it.
- A researcher hacked satellite internet connections with $300 equipment
- Denmark’s lesson in whistleblowing: Don’t arrest the whistleblowers
- Notorious eavesdropper NSA issues guide to hiding your location data
- How to back up your files and encrypt them
- The history of the internet, when it was invented, and how it got to where it is today
- Instagram stored messages and photos you wanted to delete
- How to improve your email security
- Interested in cybersecurity jobs? You’ll need these skills
- Face masks do help evade facial recognition tech—for now
- How (and why) to keep multiple online identities separate
- The CIA was secretly granted much more freedom to carry out cyberattacks
- Modern-day encryption has ancient cryptography beginnings
- Big changes to data protection laws in the EU and Brazil
- New semester, new surveillance: How schools plan to monitor students
- Infographic: How your phone gives up your privacy
- U.S. Senate to vote on EARN IT bill, endangering encryption
- Here’s how bug bounties improve security
- ExpressVPN launches a bug-bounty program hosted by Bugcrowd
- The U.S. wants to stop funding open-source projects. Here’s why that’s bad.
- Staying private and anonymous online is in your best financial interests
- In a possible first, facial recognition has led to a wrongful arrest
- The battle to outlaw end-to-end encryption in the U.S. is heating up
- What is malware? How viruses, trojans, and ransomware work
- What is internet privacy and how should you protect your online privacy?
- What happens to your privacy if you go completely cashless?
- New Android malware targets Facebook Messenger and WhatsApp
- Covid-19’s biggest casualty will be the further degradation of our individual privacy
- Survey: Americans distrust contact-tracing apps but are willing to use them for the greater good
- How do advertisers always know where you are?
- How to secure your video-conferencing apps
- What is cybercrime? 5 types and examples of cybercrime explained
- Contactless supermarkets are here. But at what cost?
- What is Off-Facebook activity, and what does it reveal about your online activity?
- EARN IT Act: U.S. might permanently ban end-to-end encryption
- Google and Apple are co-creating a contact-tracing tool. Can you trust it?
- How to spot Covid-19 phishing and ransomware attacks
- Free things you can do online when you’re stuck at home
- Countries are using greater surveillance measures to track Covid-19. What are they tracking?
- Students and activists in the U.S. lead the fight against facial recognition
- How to work from home: Keeping safe and sane while remote
- Google is trying to make its new terms of service more readable
- Let’s Encrypt has issued a billion certificates, securely encrypting nearly 200 million sites
- Chrome extensions found leaking millions of records
- Facial recognition works even when you’re covering your face
- A new survey shows Americans increasingly care about privacy
- Google was publicly indexing your private WhatsApp groups, and no one knows for how long
- Are you an Android user? Your Bluetooth might be compromised
- The uncrackable Android trojan: What is xHelper?
- Google Maps is turning 15. How has it dominated the way we navigate?
- The privacy nightmare in our wallets
- What is SIM swapping, and how to avoid it
- In a win for privacy advocates, DuckDuckGo can now be your default search engine in the EU
- The founder of Yale’s Privacy Lab is worried by the coming age of surveillance and facial recognition
- Google’s adds Fitbit to its IoT-controlled dystopia
- 3.2 million ‘right to be forgotten’ requests since 2014
- Governments are demanding user data from Facebook in record numbers
- Cut the cord: We compare 8 live TV streaming services
- What is an e-signature, and how does it work?
- Tech that can spy on our brains is coming
- Would you trade your privacy for free apps? Some don’t have a choice.
- What is spyware and how do I remove it?
- 4 new cybersecurity threats in 2019
- Announcing the winner of the 2019 Future of Privacy Scholarship
- Infographic: The rise of facial recognition in airports
- How to make your photos more private on social media
- Are at-home DNA tests worth the privacy risks?
- Can filmmaking be the future of VR?
- As we rush toward convenience, say so long to privacy
- 3 things activists can do to strengthen their privacy and security
- You should be compartmentalizing your browsers. Here’s how it works.
- Your devices are rating you. Behave accordingly.
- What is a CA certificate, and how does it work?
- Anonymized demographic data can still be used to identify you
- 11 massive government data breaches
- Study confirms less than 20% always read terms of service
- Siri and Alexa train their AI with your voice. Here’s how to delete that data.
- How to stop the Kazakhstan government from intercepting your internet traffic
- 9 things you can do with a home server
- Report: Stalkerware apps not held accountable for infringing privacy rights
- The fight for online privacy is heating up in Maine
- Wozniak says we should get off Facebook but why should Zuckerberg care?
- Why should I use two-factor authentication?
- 6 ways to protect your online finances… In the physical world
- Why you shouldn’t ignore ‘Update Your Device’ messages
- ExpressVPN survey reveals Americans do care about privacy after all
- Google is using Gmail to track your purchases. No one knows why.
- The fight for your face: The battles deciding the fate of facial recognition
- Worried your devices will get confiscated at the border? Here’s what you can do
- What is incognito mode, and is it safe?
- 6 common misconceptions about passwords
- Profits rise, but Facebook’s poor privacy could still cost Zuckerberg
- Will ExpressVPN use the WireGuard protocol?
- 10 ways the NSA is spying on you right now
- A controversial NSA phone records program might be shutting down
- An unprotected server leaked 24 million sensitive housing documents not once but twice
- Share files securely and anonymously with OnionShare 2
- Delete these now: The worst apps for privacy in 2019
- What are botnets, and how do you protect against them?
- Could Facebook’s messenger merger signal dark days for WhatsApp users?
- FaceTime flaw lets people hear you, before you even answer
- Facebook’s 10-Year Challenge went from nostalgic to dystopian real quick
- In U.S. government shutdown, your privacy takes a hit
- Here’s why Australia’s cybersecurity bill is a terrible idea
- Cloudy skies ahead: LA is suing the Weather Channel for selling user data
- 4 Ways you can be identified through social media
- Facebook vs. ad blockers: No matter who wins, you lose
- France is bidding adieu to Google in favor of a more private search engine
- What are the most dangerous technologies of the surveillance age?
- What will happen to internet privacy in the future?
- Weighing up the morality of internet privacy
- How plausible deniability can protect your data
- Announcing the winner of the 2018 Future of Privacy Scholarship
- An introduction to threat modeling
- Is internet privacy a lost cause?
- Am I being spied on? Here’s how you might be
- Swedes are inserting tiny microchips under their skin
- ExpressVPN’s Cyber Security GIF-away: All the winners!
- How to properly dispose of your hard drives
- Headed to New Zealand? Prepare to unlock your phone at Customs
- ExpressVPN launches “Signals of Trustworthy VPNs” with CDT
- The art of social engineering: Are you being conditioned?
- 4 ways the CIA can hack you right now
- Why HTTPS vs. VPN makes no sense
- Facebook finally stands up for privacy as the U.S. government demands to hack Messenger
- Wi-Fi security: How to stay safe while connected
- ExpressVPN fixes “Voracle” compression vulnerability in apps
- The California Consumer Privacy Act (CCPA) aims to protect user data. Does it?
- 6 easy ways to improve your online privacy and security
- How brute-force attacks reveal your passwords
- The secret codes that nobody can crack
- 4 ways to back up your data securely
- The 4 best encrypted email providers for extra security
- Girl Scouts are our next wave of cybersecurity experts
- PGP is still pretty good for privacy
- Privacy in America vs. Europe: Here’s how the EU does data different
- Why you should use a unique password for every online account
- Change your Firefox settings for a more private browsing experience
- Facebook has a better memory of you than you do—find out what it knows
- Upset about Facebook? You should be more worried about your ISP
- Did the internet fail to deliver on its early promises?
- Breaking news: White House blocks Twitter
- The CLOUD Act was just signed into law: Here’s what you need to know
- #DeleteFacebook and use these apps instead
- What are VPN connection logs?
- Here’s why your printer is a tattletale
- Not even a scandal will stop Facebook from harvesting your data
- What are DNS leaks and how to prevent them
- 5 defiant, worrying, or outright bizarre Edward Snowden statements
- Go incognito: Avoid surveillance in real life
- 5 most shocking cyber scams of 2017
- In memory of John Perry Barlow
- 4 guides that will help improve your digital security
- The website that knows where your cat lives
- Two Supreme Court cases that will redefine your digital privacy in 2018
- How to use Bitcoin’s multisignature wallets
- Is there still privacy in the real world?
- 5 videos you can watch before the holidays to become an internet privacy expert
- Zero-knowledge proofs explained Part 2: Non-interactive zero-knowledge proofs
- Meet Federico Tenga: The guy who teaches North Koreans about Bitcoin
- Zero-knowledge proofs explained: Part 1
- USA Liberty Act passes House Judiciary Committee despite privacy concerns
- An interview with Mark Burdon on the sensor society phenomenon
- 3 cryptocurrencies that care about your privacy
- 6 features we actually want on our iPhones
- An interview with Bruce Schneier on the Internet of Things, global surveillance, and cybersecurity
- How to make Bitcoin Anonymous
- The evolution of encryption and why governments hate it
- The votes are in and your favorite ExpressVPN blog is…
- Meet the five students fighting for the future of Dutch digital privacy
- That’s so blasé: A quick guide on how NOT to expose other people’s privacy online
- How you could lose everything with Bitcoin
- Did Russia really ban VPNs?
- Dystopian data: How my ISP got me blacklisted from my dream school
- Here’s what happens when companies fail to put privacy first
- Whistleblowing guide: How to protect your sources
- Dystopian data: How my ISP blackmailed me with my own browsing habits
- ExpressVPN and Bitcoin celebrate 3 years of happy, anonymous marriage
- An interview with the ExpressVPN Future of Privacy Scholarship manager
- The best ways to secure your Bitcoins
- BVI jurisdiction: Why it matters
- Meet OSTIF, the privacy advocates who make the internet safer by auditing its code
- Turning data into cash: The creepy side of Facebook’s ad engine
- Trump signs new U.S. internet privacy legislation: Comcast reacts, but can you trust them?
- How a VPN router protects your whole family from internet tracking
- U.S. Congress votes to let ISPs sell your browsing data
- The NSA versus the CIA: How to protect yourself from both
- A comparison of two-factor authentication methods: Which is best for you?
- I’m sorry, Dave. I’m afraid I can’t do that: When virtual assistants go very, very wrong
- 9 women tech activists to follow on Twitter
- Unhackable notifications: It’s easy to encrypt Facebook with a PGP key
- ExpressVPN’s top 10 blogs of 2016
- The Siri-ous benefits and dangers of voice technology
- ExpressVPN’s 6 big data security predictions for 2016: Which ones came true?
- Why the Snooper’s Charter makes having a VPN more necessary than ever
- UK Investigatory Powers Bill: 3 implications for your privacy
- What is my IP address? A new ExpressVPN privacy checker reveals all
- Ranked: Best (and worst) search engines for privacy in 2023
- What’s best for internet privacy: Tor then VPN, or VPN then Tor?
- 5 ways a VPN will make your internet better (with added kitten pics)
- The 4 best apps to properly secure your iPhone in 2018
- The online land of the free definitely isn’t America. So who is it?
- Silver Surfer security tips: Stay safe online through your golden years
- Salts and hashes: How apps and websites protect your passwords
- Can Facebook quizzes really tell you the name of your future spouse?
- What is an .onion address on Tor, and how to get one
- 5 years later: How Edward Snowden changed the world
- An interview with Ashton Eaton, world’s greatest athlete and ExpressVPN user
- Test your web skills with the ExpressVPN internet privacy quiz
- Is there a big Pokémon Go conspiracy? Probably not
- The 3 best Bitcoin wallets for Android
- ExpressVPN reviews the 3 best Bitcoin wallets for iOS
- 7 best Android security apps for 2021
- Pokémon, no! 9 privacy issues to consider when playing Pokémon Go
- How to secure your Bitcoins and prevent irrecoverable wallet loss
- How to replace old or damaged hard drives securely
- How to stop advertisers from tracking your browsing habits
- How Craig Wright definitely didn’t prove he is Satoshi Nakamoto
- Can my router catch a virus?
- ExpressVPN is the top VPN for travel
- Internet hacks: Phishing and spearphishing explained
- How spam became internet spam, via forum spam, and email spam. Spam.
- ExpressVPN and OpenMedia unite against internet oppression
- Is Craig Wright the man behind Bitcoin?
- ExpressVPN infographic: The Panama Leak in numbers
- How botnets use you to make money
- New bill aims to destroy encryption in the U.S.
- Do I need antivirus on my computer?
- White House catches up with 21st century tech
- 5 questions about the new WhatsApp encryption upgrade
- What the Panama Leak means for corruption and privacy
- New York City’s free public Wi-Fi comes at a price
- Internet hacks: Brute-force attacks and how to stop them
- North Korea: Strange facts from the weirdest country on Earth
- What happens when good Chrome extensions turn bad
- Memory removal is the real world right to be forgotten
- As users turn to ad blockers, sites start blocking users
- Batman v Superman: Who’s got the best secret identity?
- OnionShare: Secure and anonymous file sharing
- It’s brilliant. But what is the internet?
- Guide to stronger passwords – Part 3 (Diceware)
- What Apple’s fight against the FBI means for the future of privacy
- Guide to stronger passwords, Part 1 (two-factor authentication)
- AT&T happy to help NSA spy on millions
- Wikimedia Foundation & rights groups sue NSA over mass surveillance
- No Wi-Fi, no problem: Hackers go low-tech to steal your data
- Our thoughts on the EU’s “right to be forgotten” ruling
- Why we should all care about metadata surveillance
- Category: hidden
- Category: Other
- Take these tests to verify your password security
- How hackers get passwords
- How websites check your password
- The history of the internet: From its start to where it is today
- Cybersecurity lessons: Safer private keys with Shamir’s Secret Sharing
- Cybersecurity lessons: Risk of email takeover via a 4th-party provider
- Cybersecurity lessons: Privilege escalation via file read/write
- Cybersecurity lessons: A PATH vulnerability in Windows
- Love photo-editing apps? Don’t give away your face too easily
- App Store’s privacy labels: Fact or fiction?
- ExpressVPN jointly launches industry principles to boost consumer trust
- Mozilla and ExpressVPN announce partnership to provide VPN services
- Category: Privacy news
- Q&A: Mark T. Hofmann, on the psychology of cybercrime
- Guide: How to safely scan QR codes
- How deepfakes are changing what we remember
- Q&A: Kateryna Balaban, on how VPNs are helping protect refugees
- Survey: Remote workers are working about 1/3 of the time
- The Twitterverse in Numbers
- Spying, sabotage, and leaks: The cyber threats within Formula One
- Who spends the most time gaming? It’s not Gen Z
- Should you get a smart ring?
- Is Lensa safe? A privacy guide for using the Lensa app
- ExpressVPN survey reveals the perils of young children on social media
- Uses of blockchain (beyond finance)
- What to do if you’re a victim of revenge porn
- Survey: How much time do you waste resetting your passwords?
- How much does a VPN cost in 2023?
- Quiz: Test your privacy knowledge!
- Top 6 deepfake apps: Are they safe?
- How private are your fitness apps? 5 tips to keep them secure
- Your school is tracking your online activity—here’s what to do about it
- Quick biography: Edward Snowden
- 3 lesser-known online privacy tools you should start using
- How to change app permissions on your devices
- Announcing the 2017 ExpressVPN Future of Privacy Scholarship Winner
- 3 ways to celebrate Privacy Awareness Week 2017
- An interview with OSTIF, the team behind the OpenVPN audit
- ExpressVPN launches ExpressChat: The future of chat apps
- Last-minute privacy inspired Christmas gifts you can buy at the gas station
- Built to last: The new discipline of privacy engineering
- PPTP, L2TP, and a plethora of VPN protocols
- Ask Lexie! How to fix a hacked MacBook
- How do you pay for your free fitness app?
- Are the three biggest internet mysteries actually related?
- The history of secret banking in Switzerland
- Batman v Superman: The best secret identity infographic
- Incredible! You found all the eggs! – Now closed
- How much can metadata reveal? Just ask John McAfee
- The court case that will define technology and privacy for decades
- Et tu, Zuckerberg? Facebook and Google join Apple encryption row
- The TPP is now one step closer to becoming a terrifying reality
- How to keep your messages private and anonymous
- 4 people totally busted for epic social media fails
- 5 smart devices that are dumb on privacy
- Tails 2.0 installation and review
- Politics and privacy: Where does your 2016 presidential candidate stand?
- What would you give for free Wi-Fi? Probably more than you think
- The best apps & extensions that protect your privacy in Safari
- How Flash is used to destroy your computer
- Is Siri spilling your secrets? – #WTFWednesday
- Someone left the fridge open to hackers – #WTFWednesday
- Which body part did this man eat to avoid being ID’ed?
- US corporations that skimp on cybersecurity now subject to FTC regulation
- Creepy Chrome extension lets you stalk your Facebook friends in real life – #WTFWednesday
- AT&T’s free Wi-Fi comes with one big catch
- iOS 9 can track your sex life?
- Facebook can identify you even if it can’t see your face – #WTFWednesday
- Pixels in images can hack your computer – #WTFWednesday
- Appealing amendments: NSA lawsuit gets another chance
- Milking it: NSA goes after advertiser cookies for user data
- Is your Samsung Smart TV spying on you? – #WTFWednesday
- 5 parts of your body that betray your identity
- Game over: Hacking Team disclosure exposes spy agency playbooks
- London’s 500,000 cameras are watching you. All the time – #WTFWednesday
- Australia’s new anti-piracy law: Sink or swim?
- A spy-proof network? Astoria may hold the answer
- How hackers can use your fingerprints to frame you
- Internet.org: Too good to be true?
- Great white north goes pro-spy with Bill C-51
- FBI’s plan to expand hacking power advances despite privacy fears
- Live in Australia? Your data may be snatched from you in the near future
- NSA spying continues
- NSA tapping into North Korea
- DuckDuckGo Internet privacy review
- Literally malware? The figurative explosion of Uber’s app
- No negotiation: The rising threat of crypto ransomware
- Theft from the skies: Could cell phone data theft affect you?
- Just looking? ISPs are watching you browse
- Laura Poitras and the Digital Exiles
- OS X Yosemite: Are security and privacy the first thought or an afterthought?
- Don’t get bit: URL-shortening service flagged as malware
- Verizon’s ‘perma-cookie’: Just another example of how ISPs invade, threaten our privacy
- Smart meters, dumb security? Hacking the Internet of Things
- Soggy cardboard? Dropbox says it wasn’t hacked
- New documentary shining light on Snowden: Citizenfour
- BadUSB virus gets badder: New malware threat fix released
- PayPal opts into Bitcoin payments via BitPay, Coinbase and GoCoin
- Our reaction to Prism and NSA spying
- Category: Streaming
- 2023 PGA Championship: Odds, Picks & Favorites to Win
- 2023 NBA Playoff Predictions: Bracket Picks & Analysis
- Who will win March Madness 2023?
- India streaming in 2022: Streamers hit big with Indian originals
- Can Messi win the 2022 World Cup?
- The ultimate FIFA World Cup 2022 schedule
- Infographic: What drives sports streaming in the UK?
- Where to stream 2022 Oscar winners and nominees
- The ultimate guide to streaming football (soccer) online
- Love sports? Don’t miss a game with our live streaming roundup
- Category: Tips & tricks
- What is a dark web scan?
- Guide: How to use ChatGPT to improve your writing
- The cost of FOMO: Biggest event ticket price hikes for 2023
- Q&A: ExpressVPN co-founder Peter Burchhardt on the shifting state of digital privacy
- Google Chrome vs. Safari: Which browser is better for iPhone and Mac?
- Guide: How to buy Bitcoin anonymously
- How does Google know your location when you’re using a VPN?
- Phones for kids: A buying guide to age-appropriate tech
- 10 reasons to use a VPN
- DoS vs. DDoS attacks: What’s the difference?
- How to reset your Steam password
- 9 gadgets to help you feel more eco-friendly
- How to delete your Dropbox account
- How to permanently delete your Amazon account
- Delete Facebook account instantly and permanently in 2023
- How to delete your Gmail account permanently
- How to delete your Google search history
- How to remove Safari on Mac and iOS
- How to delete your Yahoo account permanently
- How to delete your Telegram account permanently
- Code integrity primer: GitHub commit signature verification via YubiKey
- How to permanently delete your Twitter account
- Protect your financial privacy with Bitcoin: A comprehensive guide
- How to delete your hard drive browsing history
- The jargon-busting internet security technical glossary
- How to set up a home server and use it as a Bitcoin node
- How to permanently delete your Instagram account
- How to delete your TikTok account permanently
- What is off-the-record messaging (OTR)?
- How to delete your Snapchat account permanently
- 6 times cyber scammers used celebrities to con people
- How to spot common red flags in phishing emails
- VPN vs. VPS: What’s the difference?
- Cybersecurity lessons: Flaw in Zendesk file-upload feature
- Cybersecurity lessons: Monitoring password manager activity
- What is the Internet of Things?
- How to secure your iPhone, iPad, and other Apple devices
- ExpressVPN’s 2017 Cyber Monday and Black Friday VPN Discount!
- Internet safety guide: 5 ways to help your child stay safe online
- The biggest hacks that ever happened
- Guide to stronger passwords, Part 2 (password managers)
- Blockbuster movie plots ‘fixed’ with a VPN
- Six big data security predictions for 2016
- Hey, Aussies! Hide your IP to stop your ISP from spying on you
- The 3 best browser extensions to protect your privacy (updated for 2019)
- New strain of malware steals credit card info from local businesses
- Viral outbreak inspires MERS-themed malware
- Pot, meet kettle: Spyware maker compromised, denies everything
- The Equation Group, hard drives and the Death Star of malware
- Hacktivism and vandalism were the main motivations for DDoS attacks last year
- Is ransomware the greatest highway robber of the 21st century?
- The KooZoo camera app: It’s a jungle out there
- “Bring your own device” to work: Is it worth it?
- Internet Systems Consortium site hacked
- Top 10 security breaches of 2014
- Encrypted chat apps: Give ’em nothing to talk about
- What Is a VPN proxy and why do I need one?
- Category: Video
- Category: Win stuff!
- Win 12 months of ExpressVPN just by tweeting a GIF!
- Watch the 2018 World Cup and win an ExpressVPN subscription
- Watch the 2018 NHL Playoffs with ExpressVPN and win a 12-month VPN subscription
- Watch NCAA March Madness 2018 with ExpressVPN and win a 12-month VPN subscription
- Watch the Super Bowl with ExpressVPN and win a 12-month VPN subscription
- Win a VPN router: The first 10 entries get a 12-month ExpressVPN subscription… Go!
- Win a VPN-ready router this National Cyber Security Awareness Month!
- This National Cyber Security Awareness Month, learn all about IoT security with ExpressVPN!
- The 500th blog post! Win 500 days of ExpressVPN to celebrate
- 10 Lucky people found all the eggs to win free ExpressVPN!
- The eggscellent 2017 Easter egg hunt giveaway—win free ExpressVPN!
- Congratulations! You found all the eggs!
- Unsecured internet is terrifying! Win an ExpressVPN subscription to keep the Internet ghouls away
- Subscribe to ExpressVPN’s YouTube channel – win a glorious free year of ExpressVPN
- Portugal are champions of Europe, but ExpressVPN’s Euro winners get the world!
- Predict the Euro 2016 champions to win an annual ExpressVPN subscription
- Win Dad an ExpressVPN subscription for Father’s Day
- ExpressVPN’s massive Easter competition winners!
- Freebies, facts, and fun: Happy Easter from ExpressVPN!
- ExpressVPN Easter Giveaway – win free stuff!
- Celebrate the holidays with free stuff!