-
Modern-day encryption has ancient cryptography beginnings
How to communicate privately has fascinated mathematicians for millennia, possibly as far back as ancient Egypt. Greek strategists would often make use of simple cryptographic tools. Julius Caesar rep...
-
Free VPNs exposed 20 million records, but ExpressVPN has your back
This post was originally published July 30, 2020. Seven free VPN providers that assured users they don’t keep activity logs have left their servers exposed to the public, containing, you guessed it,...
-
Infographic: How your phone gives up your privacy
Want more tips on staying private and secure on your mobile devices? Read our comprehensive mobile security guide.
-
ExpressVPN launches a bug-bounty program hosted by Bugcrowd
Note: As of July 1, 2025, we’ve transitioned from Bugcrowd to YesWeHack. At ExpressVPN, nothing is more important than our users’ privacy, which we ensure through our policies and the security of...
-
Here's how bug bounties improve security
Software could be the most complex tool created by humans. While it might still be possible for a single individual to understand all the functioning parts of a car or telephone, it’s unlikely any o...
-
The U.S. wants to stop funding open-source projects. Here’s why that’s bad.
You may not have heard of the Open Technology Fund (OTF), but you’ve probably used tools that have gotten its financial support—Tor, Tails, and Signal have all been beneficiaries of the OTF. In To...
-
What is malware? How viruses, trojans, and ransomware work
Malware, or "malicious software," is a term for a variety of viruses, spyware, or ransomware (cryptolockers) that cause harm to a user, their data, or devices. The term malware implies malicious inten...
-
What is internet privacy and how should you protect your online privacy?
We use the internet for just about everything in our personal and private lives—and what we do online has become valuable data. Large corporations want to track our activity so they can serve us wit...
-
How to secure your video-conferencing apps
This post was originally published on May 14, 2020. If you are working from home right now, chances are you are relying heavily on at least one video-conferencing app to conduct all your previously in...
-
What is cybercrime? 5 types and examples of cybercrime explained
Think about large-scale heists and it’s normal to conjure an image of a group of thieves robbing a bank, whisking away cash in black duffel bags. While such crimes haven’t gone away, criminals in ...
Tips & tricks
