Tips & tricks

Mask with a smiley face.
2 mins

Face masks do help evade facial recognition tech—for now

A study by the U.S. government found that even some highly accurate algorithms failed to match photos of masked individuals to their pictures up to 50% of the time.
An illustratin of a woman juglging different faces.
10 mins

How (and why) to keep multiple online identities separate

To keep an online persona separate from, and unconnected to, a legal identity, it’s important to understand which identifiers are commonly used to de-anonymize a person.
Wrapping around a hexagonal bar.
6 mins

Modern-day encryption has ancient cryptography beginnings

How to communicate privately has fascinated mathematicians for millennia, possibly as far back as ancient Egypt. Greek strategists would often make use of simple...
A collage of images related to mobile devices, e.g.: a Sim card and a USB socket.
1 min

Infographic: How your phone gives up your privacy

This visual guide covers mobile security tips, tricks, and best practices and will help secure your phone from the most determined of hackers.
Magnifying glass over code.
3 mins

Here’s how bug bounties improve security

Software could be the most complex tool created by humans. While it might still be possible for a single individual to understand all the...
A bug under a microscope.
2 mins

ExpressVPN launches a bug-bounty program hosted by Bugcrowd

We encourage security researchers to look for vulnerabilities in our apps, website, servers, and all other ExpressVPN assets.
A broken Open Technology Fund logo.
3 mins

The U.S. wants to stop funding open-source projects. Here’s why that’s bad.

You may not have heard of the Open Technology Fund (OTF), but you’ve probably used tools that have gotten its financial support—Tor, Tails, and...
A trojan horse with a bug inside.
3 mins

What is malware? How viruses, trojans, and ransomware work

Definitions of the many types of malware, plus tips on how to protect yourself from viruses, trojans, and ransomware.
Working at a computer with a security camera.
5 mins

What is internet privacy and how should you protect your online privacy?

We use the internet for just about everything in our personal and private lives—and what we do online has become valuable data. Large corporations want...
Video camera on a laptop screen.
2 mins

How to secure your video-conferencing apps

This post was originally published on May 14, 2020. If you are working from home right now, chances are you are relying heavily on at...

Featured Posts

ExpressVPN is proudly supporting

  • logo_1
  • logo_2
  • logo_3
  • logo_4
Need help? Chat with us!

Live chat

Online