How to stop advertisers from tracking your browsing habits
The primary ways of de-anonymizing users on the internet is through the use of cookies and personal information.
Web sites...
Can my router catch a virus?
A router works like a small computer and runs customized software designed for a particular purpose. Routers have operating...
Internet hacks: Phishing and spearphishing explained
Phishing, pronounced fishing, is a social engineering technique designed to steal passwords, credit card details, and other sensitive information....
What is a transparent proxy?
A transparency proxy is used for censorship and unblocking content. Here's how to detect and bypass a transparency proxy.
DNS hijacking explained
DNS Hijacking also called DNS Poisoning or DNS spoofing, is a tactic commonly used by authoritarian regimes to restrict...
How botnets use you to make money
Robot Networks (Botnets) are almost exclusively created with the purpose of financial gain, though some botnet attacks are politically...
Ask Lexie! How to fix a hacked MacBook
Hi, I’m Lexie, and I work for ExpressVPN’s security team.
ExpressVPN receives lots of emails and comments from users and...
Internet hacks: The difference between DoS and DDoS attacks
While often referred to in the media as hacking, a Denial of Service Attack (DoS) is not an intrusion...
Do I need antivirus on my computer?
Tl;dr: No, antivirus software no longer reliably protects against malware threats. To understand why, read below about the history...
What the Panama Leak means for corruption and privacy
Last Sunday (April 3, 2016) the International Consortium of Investigative Journalists (ICIJ) and the Sueddeutsche Zeitung (SZ) released the...