Tips & tricks

An illustration of a laptop held by puppet strings.
2 mins

What are botnets, and how do you protect against them?

Botnets are large networks of hijacked devices (robots) that can be remotely controlled by their creator. Mainly run for profit by criminal organizations, botnets can,...
The logos of Facebook Messenger, Instagram, and WhatsApp linked together.
4 mins

Could Facebook’s messenger merger signal dark days for WhatsApp users?

NOTE: This post was originally published on January 31, 2019 Facebook founder Mark Zuckerberg recently announced plans to merge his three dominant messaging services: Instagram,...
Facebook Meme Challenge Data Mining
4 mins

Facebook’s 10-Year Challenge went from nostalgic to dystopian real quick

NOTE: This post was originally published on January 25, 2019 A seemingly innocuous photo op with a potentially seedy underside, the 10-Year Challenge is the...
An image of Facebook downvoting ad blockers
3 mins

Facebook vs. ad blockers: No matter who wins, you lose

NOTE: This post was originally published on December 15, 2018 In the latest chapter of Facebook’s war against ad blockers, developers have reported that the...
An illustration of an atomic bomb explosion. Because this is serious stuff.
3 mins

An introduction to threat modeling

If you are always worried about your ISP, corporations, and the government spying on you, maybe it’s time to complete an exercise called threat...
An image of a laptop shaking its contents into the bin.
3 mins

How to properly dispose of your hard drives

Data is valuable. Your pictures, legal documents, chat logs, and even saved video games are all things you wouldn't want to be public. Today, people...
ExpressVPN and Center for Democracy and Technology logos.
1 min

ExpressVPN launches “Signals of Trustworthy VPNs” with CDT

NOTE: This post was originally published on October 16, 2018 Crunchy? Extra creamy? Reduced fat? Old-fashioned, whatever that means? We’ve all had that feeling of being...
An illustration of a man in a hoodie using puppet strings on a man sat at a desk.
5 mins

The art of social engineering: Are you being conditioned?

As we get better at securing our computer systems, we are discovering that the weakest line of defense is, in fact, the human being....
A browser with an HTTPS green lock. VPN is written in the search bar.
2 mins

Why HTTPS vs. VPN makes no sense

HTTPS vs. VPN makes very little sense. Both are important means of internet protection, and there is absolutely no conflict between them.
A padlock with a Wi-Fi symbol.
3 mins

Wi-Fi security: How to stay safe while connected

Wireless security has two components: Authentication and secrecy. And, in theory, responsibility for network security lies with both operators and users. Operators of Wi-Fi...

Featured Posts

ExpressVPN is proudly supporting

  • logo_1
  • logo_2
  • logo_3
  • logo_4
Need help? Chat with us!

Live chat

Online