Internet security

An illustration of an eagle covering its eyes.

ExpressVPN survey reveals Americans do care about privacy after all

3 min read
A representative survey, commissioned by ExpressVPN and undertaken by Propeller Insights, produced many surprising results while confirming some of...
An illustration of a large green question mark. Inside the question mark, there is a stream of letters and numbers to symbolize code (like they did in the Matrix).

Why do I need a VPN?

3 min read
A VPN is a clever bit of software that masks the IP address of any device you install it...
An illustration of a scrap of paper with a username and password field on it. But get this! It's on a fishing hook! Lol.

What is a phishing attack?

3 min read
Phishing is by far the most common “hack” used to steal passwords, take over accounts, and enter systems without authorization. It is mostly a...

6 common misconceptions about passwords

4 min read
We all need passwords. They are by far the most used form of authentication, not only on the internet but also on the telephone,...
Hand holding a hard drive over a trash can.

Introducing TrustedServer: Why ExpressVPN is making VPN-server hard drives obsolete

4 min read
At ExpressVPN, we know users count on us to protect their privacy and security, and we take that responsibility seriously. That’s why we never...
Laptop with a green padlock with a dollar sign on it.

Protect your online banking

5 min read
It should require no further explanation why our online banking details are important. We keep our money there, and if our accounts were to...
The new ExpressVPN app, shown connected.

Best ever ExpressVPN app available on all major devices

1 min read
We’ve given the ExpressVPN app a complete overhaul! The latest version has a brand new interface and comes bundled with a host of killer...
A crowd hold their phones aloft.

The most secure messaging apps in 2019

6 min read
From WhatsApp to Snapchat, messaging apps provide a free and easy service to communicate with friends, family, and co-workers. Without encryption, however, private messages could...
Two speech bubbles overlapping with a lock in the overlap.

EFF wants Facebook and 8 other giants to #FixItAlready. We asked what that means.

6 min read
Perhaps the worst aspect of the privacy and security issues plaguing the tech we use every day is that they seem completely preventable. Why hasn’t Twitter...
Horizontal list of privacy browsers and logos.

Ranked: Security and privacy for the most popular web browsers in 2019

15 min read
In a listicle world where even the trivial is quantified, judged, and graded, let’s rank something important for a change: Which web browsers are...
Massive housing leak exposed buyer documents

An unprotected server leaked 24 million sensitive housing documents not once but twice

3 min read
If you live in the U.S. and bought a house sometime over the last decade, your information may be at risk. According to TechCrunch,...
An illustration of a laptop held by puppet strings.

What are botnets, and how do you protect against them?

2 min read
Botnets are large networks of hijacked devices (robots) that can be remotely controlled by their creator. Mainly run for profit by criminal organizations, botnets can,...

Latest Posts

Live Chat