Tips & tricks

SIM cards and arrows forming a circle.
3 mins

What is SIM swapping, and how to avoid it

Malicious actors could cancel your SIM card and divert all your calls to themselves. Here are 5 ways to protect yourself.
apple logo with padlock
4 mins

How to secure your iPhone, iPad, and other Apple devices

Got a new Apple device? Set up the built-in security features on your new iPhone, iPad, or Mac computer to protect your device and your privacy.
An illustation of a phone with "e-signature" written on it in a cursive font.
4 mins

What is an e-signature, and how does it work?

Ever signed a job contract, leased an apartment, or got a loan online? You may have benefited from an e-signature app. Here are seven to try.
A series of ones and zeroes making up the image of an eye.
3 mins

What is spyware and how do I remove it?

Spyware is software secretly installed on your machine with malicious intent. Here's how to protect against it.
An illustration of a laptop, but the screen is the classic warning sign. You know, the triangle with an exclamation point in it.
4 mins

4 new cybersecurity threats in 2019

Cybersecurity threats continue to evolve, and with more consumers making transactions online, you can be sure that hackers aren’t far away.
Iceberg below sea level.
6 mins

Why you can’t judge a VPN by its server count

When you're looking for a VPN provider, a server count alone is not a good enough gauge on how the service will perform.
Numerous Bitcoin logos daisy-chained together.
4 mins

What is a Bitcoin node and who needs one?

The Bitcoin network does not have a central authority that decides which transactions are valid and which are not. There is nobody who issues...
Information falling out of a folder of government data .
8 mins

11 massive government data breaches

We hear about private companies getting hacked or exposing customer data, but government records are equally at risk of a breach.
The internet's home icon. But bigger. And red.
7 mins

9 things you can do with a home server

Running your own server at home can be cheap and requires only basic knowledge of the command line. An old laptop can be converted...
An illustration of a laptop with password fields with asterisks. However, in front of the laptop is a hand holding a phone. The phone has open some kind of 2FA app. Nice.
4 mins

Why should I use two-factor authentication?

You might have skipped over your email provider’s prompt: Turn on two-factor authentication. Two-factor authentication, or 2FA, is a secondary security measure for logging into...

Featured Posts

ExpressVPN is proudly supporting

  • logo_1
  • logo_2
  • logo_3
  • logo_4
Need help? Chat with us!

Live chat

Online