Lexie

Lexie is the blog's resident tech expert and gets excited about empowerment through technology, space travel, and pancakes with blueberries.

172 Posts
0 Comments
15800 Claps
phishing
4 mins

Internet hacks: Phishing and spearphishing explained

Phishing is a social engineering technique to steal passwords, credit card details, and other information. Learn how to protect yourself.
A server created out of white outlines.
3 mins

What is a transparent proxy?

A transparency proxy is used for censorship and unblocking content. Here's how to detect and bypass a transparency proxy.
botnet-worm
8 mins

How botnets use you to make money

Robot Networks (Botnets) are almost exclusively created with the purpose of financial gain, though some botnet attacks are politically...
mac-hacked
2 mins

Ask Lexie! How to fix a hacked MacBook

Hi, I’m Lexie, and I work for ExpressVPN’s security team. ExpressVPN receives lots of emails and comments from users and...
Bug icon displayed on laptop
6 mins

Do I need antivirus on my computer?

Tl;dr: No, antivirus software no longer reliably protects against malware threats. To understand why, read below about the history...
Straw fedora above a drop of water.
8 mins

What the Panama Leak means for corruption and privacy

Last Sunday (April 3, 2016) the International Consortium of Investigative Journalists (ICIJ) and the Sueddeutsche Zeitung (SZ) released the...
Internet hacks
6 mins

Internet hacks: Brute-force attacks and how to stop them

A brute-force attack, also called exhaustive key search, is essentially a game of guessing and can be executed against...
the word metadata in html tags partly conceiled by empty space
1 min

How much can metadata reveal? Just ask John McAfee

Metadata can often reveal more about a file than the actual data. A 2012 manhunt illustrates this point. The...
10 mins

The court case that will define technology and privacy for decades

On December 2, 2015, the married couple Syed Rizwan Farook and Tashfeen Malik shot and killed fourteen people at...
Onion with arrows forming a circle.
5 mins

OnionShare: Secure and anonymous file sharing

Our guide shows you how to install and use OnionShare for secure, anonymous file sharing and chats.

Featured Posts

ExpressVPN is proudly supporting

  • logo_1
  • logo_2
  • logo_3
  • logo_4
Need help? Chat with us!

Live chat

Online