Tag: How To

Car headlights appear out of a misty dark. But what's this? They have eyes!!

Is your car spying on you?

3 min read
Unlike many other devices, cars are not prefixed with the word smart. Even if they’re connected to the internet—and...
Browser with boxes containing different types of browsing activity.

You should be compartmentalizing your browsers. Here’s how it works.

2 min read
We’re acutely aware that our data is valuable—our online movements are followed assiduously by companies and governments who wish...
Red circular record button.

Siri and Alexa train their AI with your voice. Here’s how...

5 min read
If you’ve ever said “Hey” to Alexa, or an “OK” to Google, chances are your voice has been recorded...
The internet's home icon. But bigger. And red.

9 things you can do with a home server

4 min read
Running your own server at home can be cheap and requires only basic knowledge of the command line. An...
An illustration of a large green question mark. Inside the question mark, there is a stream of letters and numbers to symbolize code (like they did in the Matrix).

Why do I need a VPN?

3 min read
A VPN is a clever bit of software that masks the IP address of any device you install it...
What does incognito mode actually protect against?

What doesn’t incognito mode protect against?

6 min read
Among many other techniques, websites can use cookies to track your browsing history, which may also reveal your online...
An illustration of a scrap of paper with a username and password field on it. But get this! It's on a fishing hook! Lol.

What is a phishing attack?

3 min read
Phishing is by far the most common “hack” used to steal passwords, take over accounts, and enter systems without...
The words "Best of the Blog 2018" on a soothing green background.

The 9 best ExpressVPN blogs of 2018

1 min read
2018 was a bumper year for ExpressVPN! Here's the best of 2018 from the best VPN blog in town: 1....
A padlock with a Wi-Fi symbol.

Wi-Fi security: How to stay safe while connected

3 min read
Wireless security has two components: Authentication and secrecy. And, in theory, responsibility for network security lies with both operators...

5 ways to immediately improve your online privacy and security

3 min read
Over the last few months, the ExpressVPN Blog has interviewed some notable people in the field of online privacy...

Latest Posts

Featured Posts

Live Chat