What are ‘smishing’ attacks, and how to avoid them
As if staying alert to phishing attacks in your email wasn’t enough, you also have to look out for scams via SMS.
How to hide your sensitive pictures
We’re not judging your naked selfies or NSFW pictures. But here’s how to hide them on your iPhone or Android, or in secure cloud storage.
3 browsers that block third-party cookies by default
With the sheer amount of information that can be extracted from your internet use, having a privacy-oriented browser has become essential to protecting your...
7 technologies that ruin everything
Did e-readers ruin reading? Did dating apps ruin dating? Did streaming services ruin movie-going? Our blog writers weigh in on what technology has taken from their real-life experiences.
Top cloud services to store photos online (free and paid)
With Google Photos discontinuing free unlimited storage, we list other cloud storage options for your photos.
Signs that your child is being cyberbullied
We list common examples of cyberbullying and share signs that your child is a victim.
Online privacy and safety for the LGBTQ+ community
This Pride Month, we take a look at issues surrounding online privacy among the LGBTQ+ community.
Cybersecurity lessons: Monitoring password manager activity
ExpressVPN's Security Team explains how to detect vulnerabilities and attacks on password managers and analyze the risks.
How to wipe your iPhone or Android before selling it
Failing to correctly wipe your smartphone could leave your information vulnerable for access by its next owner. Here’s how to do it.
How reputation management can help you stay private
Online reputation management (ORM) isn’t just for celebrities and politicians. Regular individuals can use these paid services to control the flow of their personal data.