An illustratin of a woman juglging different faces.
10 mins
How (and why) to keep multiple online identities separate
To keep an online persona separate from, and unconnected to, a legal identity, it’s important to understand which identifiers are commonly used to de-anonymize a person.
Laptop screen with a virus slashed out.
3 mins
To combat fake pandemic news, countries beef up censorship
These new measures suppressing press and internet freedoms are ripe for abuse.
The White House has secretly granted the CIA sweeping powers to conduct cyberattacks.
2 mins
The CIA was secretly granted much more freedom to carry out cyberattacks
Since 2018, the agency has been permitted to approve its own operations, no longer needing White House approval.
Wrapping around a hexagonal bar.
6 mins
Modern-day encryption has ancient cryptography beginnings
How to communicate privately has fascinated mathematicians for millennia, possibly as far back as ancient Egypt. Greek strategists would often make use of simple...
New legislation to impact data processing in the EU and Brazil
3 mins
Big changes to data protection laws in the EU and Brazil
A key ruling in the EU and Brazil's version of the GDPR means privacy safeguards just got strengthened for hundreds of millions of people.
CCTV camera aimed at a child wearing a mask.
4 mins
New semester, new surveillance: How schools plan to monitor students
Amid a pandemic, schools that decide to reopen might implement various invasive methods of monitoring students.
A collage of images related to mobile devices, e.g.: a Sim card and a USB socket.
1 min
Infographic: How your phone gives up your privacy
This visual guide covers mobile security tips, tricks, and best practices and will help secure your phone from the most determined of hackers.
Statue of Liberty torch with a hand reaching down.
5 mins
U.S. Senate to vote on EARN IT bill, endangering encryption
The widely criticized EARN IT bill, which might eradicate end-to-end encryption, is now up for voting by the U.S. Senate.
Magnifying glass over code.
3 mins
Here’s how bug bounties improve security
Software could be the most complex tool created by humans. While it might still be possible for a single individual to understand all the...
A bug under a microscope.
2 mins
ExpressVPN launches a bug-bounty program hosted by Bugcrowd
We encourage security researchers to look for vulnerabilities in our apps, website, servers, and all other ExpressVPN assets.

Featured Posts

ExpressVPN is proudly supporting
  • logo_1
  • logo_2
  • logo_3
  • logo_4

Live chat

Need help? Chat with us!

Online