Filter Posts
What is the WPA2 Wi-Fi Encryption Vulnerability and how does it...
WPA2 is a popular standard used to set up Wi-Fi networks and is most commonly used to authenticate users...
Technical Overview: Preventing DNS Leaks When Switching Network Interfaces
To effectively offer a user privacy and security, a VPN application must ensure that a user’s DNS requests remain...
ExpressVPN: Better Privacy and Security with Industry-Leading DNS Leak Protection
Many VPNs leak DNS data when your network connection changes, compromising your security and privacy. Learn how ExpressVPN protects you.
How to make Bitcoin Anonymous
Bitcoin is both an anonymous payment system and a transparent, open network where anyone can track and verify transactions. How...
This National Cyber Security Awareness Month, learn all about IoT security...
It’s that time of year again—the evenings are getting chillier, carved pumpkins are popping up on porch-steps, and those...
The evolution of encryption and why governments hate it
Long before governments started fighting to outlaw encryption, politicians from around the world were turning to secret codes to...
iPhone vs. Bitcoin: Over the years, how many iPhones could you...
Between its inception in 2009 and today, Bitcoin has enjoyed a spectacular rise in value. First traded in early...
A great scam or a good investment: What is an ICO?
Paris Hilton, Floyd Mayweather, The Game have all launched ICO projects. But what is an ICO? And are they worth your attention or investment?
The votes are in and your favorite ExpressVPN blog is…
Firstly, big thanks to everyone who voted for their favorite ExpressVPN blog! After counting the votes, it appears your favorite...
Meet the five students fighting for the future of Dutch digital...
The Netherlands passed a law that will greatly increase government surveillance. These students wanted a public discussion first.