ExpressVPN launches a bug-bounty program hosted by Bugcrowd
We encourage security researchers to look for vulnerabilities in our apps, website, servers, and all other ExpressVPN assets.
The U.S. wants to stop funding open-source projects. Here’s why that’s bad.
You may not have heard of the Open Technology Fund (OTF), but you’ve probably used tools that have gotten its financial support—Tor, Tails, and...
What is malware? How viruses, trojans, and ransomware work
Definitions of the many types of malware, plus tips on how to protect yourself from viruses, trojans, and ransomware.
What is internet privacy and how should you protect your online privacy?
We use the internet for just about everything in our personal and private lives—and what we do online has become valuable data. Large corporations want...
How to secure your video-conferencing apps
This post was originally published on May 14, 2020. If you are working from home right now, chances are you are relying heavily on at...
What is cybercrime? 5 types and examples of cybercrime explained
Think about large-scale heists and it’s normal to conjure an image of a group of thieves robbing a bank, whisking away cash in black...
What is cybertorture? How our minds are vulnerable to online experiences
What will change if we are forced to move our social circle to virtual lands, browse the web anonymously, and stay permanently at home?...
Maybe it’s time to dump social media, just for a little bit
For a lot of us these days, the internet has become our sole tether to the outside world, connecting us virtually to family and...
Internet censorship: What is it, and how does it happen?
The internet was initially envisioned as a medium for the free flow of information and knowledge—hence its early description as the “information superhighway.” But...
How to spot Covid-19 phishing and ransomware attacks
NOTE: This post was originally published on April 7, 2020 Spring is normally the time when tax-related phishing scams spike, spurious emails might promise tax...