Tips & tricks

The Android logo, but it's red and has evil eyes.
2 mins

The uncrackable Android trojan: What is xHelper?

We’ve advised our readers to stay safe from malware and trojans by keeping their devices updated at all times, but a new strain caught...
SIM cards and arrows forming a circle.
3 mins

What is SIM swapping, and how to avoid it

Malicious actors could cancel your SIM card and divert all your calls to themselves. Here are 5 ways to protect yourself.
apple logo with padlock
4 mins

How to secure your iPhone, iPad, and other Apple devices

Got a new Apple device? Set up the built-in security features on your new iPhone, iPad, or Mac computer to protect your device and your privacy.
An illustation of a phone with "e-signature" written on it in a cursive font.
4 mins

What is an e-signature, and how does it work?

Ever signed a job contract, leased an apartment, or got a loan online? You may have benefited from an e-signature app. Here are seven to try.
A series of ones and zeroes making up the image of an eye.
3 mins

What is spyware and how do I remove it?

Spyware is software secretly installed on your machine with malicious intent. Here's how to protect against it.
An illustration of a laptop, but the screen is the classic warning sign. You know, the triangle with an exclamation point in it.
4 mins

4 new cybersecurity threats in 2019

Cybersecurity threats continue to evolve, and with more consumers making transactions online, you can be sure that hackers aren’t far away.
Iceberg below sea level.
6 mins

Why you can’t judge a VPN by its server count

When you're looking for a VPN provider, a server count alone is not a good enough gauge on how the service will perform.
Numerous Bitcoin logos daisy-chained together.
4 mins

What is a Bitcoin node and who needs one?

The Bitcoin network does not have a central authority that decides which transactions are valid and which are not. There is nobody who issues...
Information falling out of a folder of government data .
8 mins

11 massive government data breaches

We hear about private companies getting hacked or exposing customer data, but government records are equally at risk of a breach.
The internet's home icon. But bigger. And red.
7 mins

9 things you can do with a home server

Running your own server at home can be cheap and requires only basic knowledge of the command line. An old laptop can be converted...

Featured Posts

ExpressVPN is proudly supporting

  • logo_1
  • logo_2
  • logo_3
  • logo_4
Need help? Chat with us!

Live chat

Online