Google Photos icon disintegrating.
6 mins

Top cloud services to store photos online (free and paid)

With Google Photos discontinuing free unlimited storage, we list other cloud storage options for your photos.
Speech bubbles with a thumbs down and frowning face.
3 mins

Signs that your child is being cyberbullied

We list common examples of cyberbullying and share signs that your child is a victim.
16 mins

13 more surveillance-themed movies and shows

Our new picks for more entertaining movies and shows about privacy and surveillance.
App with military camouflage and an error icon in the top right corner.
5 mins

5 times military secrets were exposed in apps

We take a look at how military personnel have inadvertently revealed sensitive locations through fitness apps, flashcard apps, and more.
Pride flag with a padlock.
4 mins

Online privacy and safety for the LGBTQ+ community

This Pride Month, we take a look at issues surrounding online privacy among the LGBTQ+ community.
Cross health symbol with Wi-Fi signal.
5 mins

The rise of telehealth: What it means for patient privacy

The increased adoption of telehealth services across the globe brings with it new and unprecedented privacy and security challenges.
Pencil eraser wiping a smartphone.
2 mins

How to wipe your iPhone or Android before selling it

Failing to correctly wipe your smartphone could leave your information vulnerable for access by its next owner. Here’s how to do it.
Amazon logo arrows pointing to toggle off.
2 mins

How to opt out of Amazon Sidewalk and stop sharing internet with neighbors

Got an Echo or Ring at home? Starting June 8, Amazon will enroll all devices to its Sidewalk program, which lets users share each other's Wi-Fi.
Red circle with cross and mouse cursor.
4 mins

How reputation management can help you stay private

Online reputation management (ORM) isn’t just for celebrities and politicians. Regular individuals can use these paid services to control the flow of their personal data.
Key with cryptocurrency symbol.
3 mins

Frightening reality: You can buy ransomware as a service

Ransomware attacks were once carried out by skilled hackers. Now, anyone with a credit card can theoretically launch them. Case in point: the Colonial Pipeline hack.

Featured Posts

ExpressVPN is proudly supporting

  • logo_1
  • logo_2
  • logo_3
  • logo_4
Need help? Chat with us!

Live chat

Online