A cloud padlock.
6 mins

How to back up your files and encrypt them

Choose the best backup method for you. Keep your data safe and accessible with these tips.
Contract with an X over it.
5 mins

The social contract of the internet is under threat. That’s a problem

Our relationship with the internet is on the precipice of being altered forever. Let’s not take that lightly.
history of the internet
35 mins

The history of the internet, when it was invented, and how it got to...

How the internet developed out of a Cold War technology to the ubiquitous phenomenon it is today.
Trash icon filled with pictures and speech bubbles.
1 min

Instagram stored messages and photos you wanted to delete

An independent security researcher found photos and messages more than a year after he deleted them.
An envelope with a lock on it.
6 mins

How to improve your email security

No matter if it’s private communication or business, your emails contain practically everything there is to know about you. From your emails, anyone can learn...
Riana Pfefferkorn headshot.
8 mins

Interview: Encryption expert Riana Pfefferkorn on the erosion of online free speech

The effect of the EARN IT Act, the problem with the U.S. concept of privacy, the emergence of regional internets, and more.
A dismantled phone and screwdriver.
3 mins

Lockdowns highlight the need to repair devices ourselves

Brands create obstacles to fixing our devices affordably or at all. And with service centers closed during the pandemic, consumers are left with no options.
A shield at the top of a ladder graph indicating the pathways to cybersecurity jobs..
4 mins

Interested in cybersecurity jobs? You’ll need these skills

Cybersecurity is a lucrative field and professionals are in high demand.
Mask with a smiley face.
2 mins

Face masks do help evade facial recognition tech—for now

A study by the U.S. government found that even some highly accurate algorithms failed to match photos of masked individuals to their pictures up to 50% of the time.
An illustratin of a woman juglging different faces.
10 mins

How (and why) to keep multiple online identities separate

To keep an online persona separate from, and unconnected to, a legal identity, it’s important to understand which identifiers are commonly used to de-anonymize a person.

Featured Posts

ExpressVPN is proudly supporting

  • logo_1
  • logo_2
  • logo_3
  • logo_4
Need help? Chat with us!

Live chat

Online