Internet hacks: Phishing and spearphishing explained
Phishing, pronounced fishing, is a social engineering technique designed to steal passwords, credit card details, and other sensitive information. The ultimate goal is to...
How spam became internet spam, via forum spam, and email spam. Spam.
Disclaimer: ExpressVPN does not endorse spam of any kind. Or Spam.
Once upon a time, Spam was just a tin of meat and in the...
The benefits of a VPN for Black Desert Online
Black Desert Online is utterly incredible. It’s a huge MMORPG with an expansive list of characters and hitherto unimaginable game mechanics. From global weather...
What is a transparent proxy?
A transparency proxy is used for censorship and unblocking content. Here's how to detect and bypass a transparency proxy.
DNS hijacking explained
DNS Hijacking also called DNS Poisoning or DNS spoofing, is a tactic commonly used by authoritarian regimes to restrict access, block, and censor content...
How botnets use you to make money
Robot Networks (Botnets) are almost exclusively created with the purpose of financial gain, though some botnet attacks are politically motivated. It is more common...
Why there won’t be an ExpressVPN lifetime subscription
You Get the VPN Service You Pay For
At ExpressVPN, service excellence is paramount. We’ve made a commitment: No marketing gimmicks and no skimping on...
Ask Lexie! How to fix a hacked MacBook
Hi, I’m Lexie, and I work for ExpressVPN’s security team.
ExpressVPN receives lots of emails and comments from users and readers about our blog posts...
Internet hacks: The difference between DoS and DDoS attacks
While often referred to in the media as hacking, a Denial of Service Attack (DoS) is not an intrusion of a computer system, but...
Do I need antivirus on my computer?
Tl;dr: No, antivirus software no longer reliably protects against malware threats. To understand why, read below about the history of malware, what antivirus software...