-
ExpressVPN is even faster with new 10Gbps servers
There’s a lot that goes on behind the ExpressVPN app’s simple interface. We’re constantly upgrading our network in ways that improve our customers’ experience—but may not be immediately noti...
-
What is a firewall & how does it work
Imagine leaving your front door unlocked. Anyone—or anything—could wander in without warning. The same goes for your digital life. A firewall is the invisible guard that checks everything trying t...
-
What your ISP sees when you use VPN
When you go online, you need an Internet Service Provider (ISP). Whether they’re home Wi-Fi or cellular providers, ISPs can potentially see a lot of what you do online. They can see every site you v...
-
What is perfect forward secrecy? Learn how it protects your privacy
Encryption is a crucial part of online security, but what happens if a cybercriminal finds the key to undo encryption and gain access to your data? It’s a scary prospect, but perfect forward secrecy...
-
WhatsApp vs. Signal: Which is more secure?
WhatsApp and Signal both offer end-to-end encryption. This technology works by scrambling the messages so that only the sender and receiver are able to put them back together. End-to-end encryption ma...
-
What is the browser-in-the-browser (BitB) attack?
You've been warned not to click on suspicious email attachments designed to steal your information, or not to open sketchy links sent to your LinkedIn inbox that can install malware onto your computer...
-
Best artificial intelligence movies through the ages
Artificial intelligence has appeared in film in various forms, moving between hyper-intelligent robots that are barely distinguishable from humans and shiny metallic Androids with gears and blinking l...
-
5 common apps that put your privacy at risk
In the cold Canadian winter, there’s nothing like a cup of Tim Hortons hot chocolate. With their app, it’s easier than ever to customize and order your favorite hot drink. However, you might not w...
-
Secure your accounts with the best free authenticator apps
There are many forms of two-factor authentication (2FA) out there. You could get a one-time code sent to your phone. You might use your fingerprint. Some people buy a hardware key (a kind of USB stick...
-
Survey reveals surveillance fears over the metaverse workplace
Working from home has become a necessary normal in the past two years, one that's led to rapid advancements in technology that supports remote collaboration—such as video conferencing, messaging app...
Featured
