Tips & tricks

A bug under a microscope.
2 mins

ExpressVPN launches a bug-bounty program hosted by Bugcrowd

We encourage security researchers to look for vulnerabilities in our apps, website, servers, and all other ExpressVPN assets.
A broken Open Technology Fund logo.
3 mins

The U.S. wants to stop funding open-source projects. Here’s why that’s bad.

You may not have heard of the Open Technology Fund (OTF), but you’ve probably used tools that have gotten its financial support—Tor, Tails, and...
A trojan horse with a bug inside.
3 mins

What is malware? How viruses, trojans, and ransomware work

Definitions of the many types of malware, plus tips on how to protect yourself from viruses, trojans, and ransomware.
Working at a computer with a security camera.
5 mins

What is internet privacy and how should you protect your online privacy?

We use the internet for just about everything in our personal and private lives—and what we do online has become valuable data. Large corporations want...
Video camera on a laptop screen.
2 mins

How to secure your video-conferencing apps

This post was originally published on May 14, 2020. If you are working from home right now, chances are you are relying heavily on at...
A sinister hand emerges from a laptop screen.
4 mins

What is cybercrime? 5 types and examples of cybercrime explained

Think about large-scale heists and it’s normal to conjure an image of a group of thieves robbing a bank, whisking away cash in black...
A whip with the lashes made from a stream of ones and zeroes.
3 mins

What is cybertorture? How our minds are vulnerable to online experiences

What will change if we are forced to move our social circle to virtual lands, browse the web anonymously, and stay permanently at home?...
Mobile phone switched off with a red off icon.
2 mins

Maybe it’s time to dump social media, just for a little bit

For a lot of us these days, the internet has become our sole tether to the outside world, connecting us virtually to family and...
An illustration of a hand covering a computer screen.
6 mins

Internet censorship: What is it, and how does it happen?

The internet was initially envisioned as a medium for the free flow of information and knowledge—hence its early description as the “information superhighway.” But...
Laptop with a fishing hook caught on a virus.
2 mins

How to spot Covid-19 phishing and ransomware attacks

NOTE: This post was originally published on April 7, 2020 Spring is normally the time when tax-related phishing scams spike, spurious emails might promise tax...

Featured Posts

ExpressVPN is proudly supporting

  • logo_1
  • logo_2
  • logo_3
  • logo_4
Need help? Chat with us!

Live chat

Online