How to improve your email security
No matter if it’s private communication or business, your emails contain practically everything there is to know about you. From...
How (and why) to keep multiple online identities separate
To keep an online persona separate from, and unconnected to, a legal identity, it’s important to understand which identifiers are commonly used to de-anonymize a person.
Modern-day encryption has ancient cryptography beginnings
How to communicate privately has fascinated mathematicians for millennia, possibly as far back as ancient Egypt. Greek strategists would...
Here’s how bug bounties improve security
Software could be the most complex tool created by humans. While it might still be possible for a single...
What is malware? How viruses, trojans, and ransomware work
Definitions of the many types of malware, plus tips on how to protect yourself from viruses, trojans, and ransomware.
How do advertisers always know where you are?
To build a profile of you, advertisers can gather a multitude of information. They can follow you around the...
What is cybertorture? How our minds are vulnerable to online experiences
What will change if we are forced to move our social circle to virtual lands, browse the web anonymously,...
8 anti-spam techniques your email uses to prevent spam
Email spam has evolved dramatically, but so have the tools to detect it. Here's how spam filters keep your inbox clean.
Global Internet and Social Media Censorship Report, 2020
ExpressVPN examines internet censorship around the world and reports which countries block which social media platforms.
How to secure your iPhone, iPad, and other Apple devices
Got a new Apple device? Set up the built-in security features on your new iPhone, iPad, or Mac computer to protect your device and your privacy.