Tips & tricks

Message bubbles made up of US, UK, Australia, Japan, New Zealand, Canada, UK, and India flags
4 mins
7 countries are calling for access to your private messages
Citing public safety, governments are pushing for backdoors into apps that have end-to-end encryption.
Edward Snowden's glasses.
3 mins
Quick biography: Edward Snowden
Since becoming a household name in 2013, Edward Snowden has remained in the global spotlight for his privacy advocacy and personal legal drama.
A cloud padlock.
6 mins
How to back up your files and encrypt them
Choose the best backup method for you. Keep your data safe and accessible with these tips.
An envelope with a lock on it.
6 mins
How to improve your email security
No matter if it’s private communication or business, your emails contain practically everything there is to know about you. From your emails, anyone can learn...
A shield at the top of a ladder graph indicating the pathways to cybersecurity jobs..
4 mins
Interested in cybersecurity jobs? You’ll need these skills
Cybersecurity is a lucrative field and professionals are in high demand.
Mask with a smiley face.
2 mins
Face masks do help evade facial recognition tech—for now
A study by the U.S. government found that even some highly accurate algorithms failed to match photos of masked individuals to their pictures up to 50% of the time.
An illustratin of a woman juglging different faces.
10 mins
How (and why) to keep multiple online identities separate
To keep an online persona separate from, and unconnected to, a legal identity, it’s important to understand which identifiers are commonly used to de-anonymize a person.
Wrapping around a hexagonal bar.
6 mins
Modern-day encryption has ancient cryptography beginnings
How to communicate privately has fascinated mathematicians for millennia, possibly as far back as ancient Egypt. Greek strategists would often make use of simple...
A collage of images related to mobile devices, e.g.: a Sim card and a USB socket.
1 min
Infographic: How your phone gives up your privacy
This visual guide covers mobile security tips, tricks, and best practices and will help secure your phone from the most determined of hackers.
Magnifying glass over code.
3 mins
Here’s how bug bounties improve security
Software could be the most complex tool created by humans. While it might still be possible for a single individual to understand all the...

Featured Posts

ExpressVPN is proudly supporting
  • logo_1
  • logo_2
  • logo_3
  • logo_4

Live chat

Need help? Chat with us!

Online