Tips & tricks

An illustratin of a woman juglging different faces.
10 mins
How (and why) to keep multiple online identities separate
To keep an online persona separate from, and unconnected to, a legal identity, it’s important to understand which identifiers are commonly used to de-anonymize a person.
Wrapping around a hexagonal bar.
6 mins
Modern-day encryption has ancient cryptography beginnings
How to communicate privately has fascinated mathematicians for millennia, possibly as far back as ancient Egypt. Greek strategists would often make use of simple...
A collage of images related to mobile devices, e.g.: a Sim card and a USB socket.
1 min
Infographic: How your phone gives up your privacy
This visual guide covers mobile security tips, tricks, and best practices and will help secure your phone from the most determined of hackers.
Magnifying glass over code.
3 mins
Here’s how bug bounties improve security
Software could be the most complex tool created by humans. While it might still be possible for a single individual to understand all the...
A bug under a microscope.
2 mins
ExpressVPN launches a bug-bounty program hosted by Bugcrowd
We encourage security researchers to look for vulnerabilities in our apps, website, servers, and all other ExpressVPN assets.
A broken Open Technology Fund logo.
3 mins
The U.S. wants to stop funding open-source projects. Here’s why that’s bad.
You may not have heard of the Open Technology Fund (OTF), but you’ve probably used tools that have gotten its financial support—Tor, Tails, and...
A trojan horse with a bug inside.
3 mins
What is malware? How viruses, trojans, and ransomware work
Definitions of the many types of malware, plus tips on how to protect yourself from viruses, trojans, and ransomware.
Working at a computer with a security camera.
5 mins
What is internet privacy and how should you protect your online privacy?
We use the internet for just about everything in our personal and private lives—and what we do online has become valuable data. Large corporations want...
Video camera on a laptop screen.
2 mins
How to secure your video-conferencing apps
This post was originally published on May 14, 2020. If you are working from home right now, chances are you are relying heavily on at...
A sinister hand emerges from a laptop screen.
4 mins
What is cybercrime? 5 types and examples of cybercrime explained
Think about large-scale heists and it’s normal to conjure an image of a group of thieves robbing a bank, whisking away cash in black...

Featured Posts

ExpressVPN is proudly supporting
  • logo_1
  • logo_2
  • logo_3
  • logo_4

Live chat

Need help? Chat with us!

Online