What is an e-signature, and how does it work?
If you’ve recently signed a new job contract, finalized the lease on an apartment, or confirmed a loan online, chances are you’ve used an...
What is spyware and how do I remove it?
Identity theft affected nearly 15 million Americans last year, racking up 4 billion USD in losses. And if you were one of the victims,...
4 new cybersecurity threats in 2019
Cybersecurity threats continue to evolve, and with more consumers making transactions online, you can be sure that hackers aren’t far away.
Why you can’t judge a VPN by its server count
When you're looking for a VPN provider, a server count alone is not a good enough gauge on how the service will perform.
Cryptojacking: What is it and how do I guard against it?
The term “cryptocurrency,” a combination of “cryptography” and “currency,” alludes to the fact that cryptocurrencies are a form of digital money that uses cryptographic...
6 of the biggest crypto heists of all time
When you store your money in a traditional bank, you do so because you have few other options. Of course, it’s possible to sidestep...
What is a Bitcoin node and who needs one?
The Bitcoin network does not have a central authority that decides which transactions are valid and which are not. There is nobody who issues...
8 massive government data breaches
We’re constantly hearing about data breaches lately—and it’s no wonder, given that 5 billion personal records were exposed last year.
While the majority of cybersecurity...
9 things you can do with a home server
Running your own server at home can be cheap and requires only basic knowledge of the command line. An old laptop can be converted...
PwC audits ExpressVPN servers to confirm essential privacy protections
At ExpressVPN, we take your privacy and security extremely seriously. To best protect our customers, we follow a central principle of never storing any...