Privacy news

A door with the Apple logo.
3 mins
Explainer: Apple’s plans to scan your iPhone photos
Apple will soon start scanning all photos before they get uploaded to iCloud Photos. Find out how this affects you and how to stay private.
Borders comprised of binary code.
5 mins
Smart borders: Hubs of mass surveillance
Automated border-crossing systems are designed to be convenient. But what are we giving up along the way?
An alert symbol with wings.
2 mins
What is Pegasus spyware? And how to protect your phone
Pegasus is phone hacking software used by governments. Read how it can be secretly installed on your phone remotely.
Building facade with columns and an eye.
4 mins
Government hacking: How countries surveil their own citizens
There have been numerous incidents in which governments have broken into encrypted apps. This puts your privacy at risk and raises cybersecurity concerns.
App icon with a cross and and eye.
3 mins
Our privacy analysis of 10 opioid treatment and recovery apps
The study raises questions about privacy and security surrounding telehealth, which has been on the rise amid calls for social distancing.
Percentage symbol turning into a forbidden sign.
2 mins
This symbol could break your phone’s Wi-Fi
Don’t join Wi-Fi networks named with it—your iPhone could get confused, and even resets won’t guarantee a fix.
App with military camouflage and an error icon in the top right corner.
5 mins
5 times military secrets were exposed in apps
We take a look at how military personnel have inadvertently revealed sensitive locations through fitness apps, flashcard apps, and more.
Amazon logo arrows pointing to toggle off.
2 mins
How to opt out of Amazon Sidewalk and stop sharing internet with neighbors
Got an Echo or Ring at home? Starting June 8, Amazon will enroll all devices to its Sidewalk program, which lets users share each other's Wi-Fi.
Key with cryptocurrency symbol.
3 mins
Frightening reality: You can buy ransomware as a service
Ransomware attacks were once carried out by skilled hackers. Now, anyone with a credit card can theoretically launch them. Case in point: the Colonial Pipeline hack.
catfish-crypto-2
3 mins
When catfish meets crypto scam on dating apps
Do your attractive matches on dating apps mainly want to talk about a great crypto opportunity? Beware of the latest catfish.

Featured Posts

ExpressVPN is proudly supporting
  • logo_1
  • logo_2
  • logo_3
  • logo_4

Live chat

Need help? Chat with us!

Online