Tips & tricks

An illustration of a browser with a green shield in the center of the screen. But wait! Inside the green shield is a tick. Super protection: Whammo!
5 mins
The 3 best browser extensions to protect your privacy (updated for 2019)
Take back control of your browsing experience by checking out our picks of the three best privacy extensions available. And they’re all free!
ftc is authorized to regulate corporate cybersecurity
2 mins
US corporations that skimp on cybersecurity now subject to FTC regulation
NOTE: This post was originally published on September 17, 2015 A US appeals court has recently ruled that the Federal Trade Commission now has the authority...
Stegosaurus.
3 mins
Pixels in images can hack your computer – #WTFWednesday
What’s so dangerous about looking at a picture file in your web browser? In the past, nothing. You loaded the image. It displayed on your...
gamapos malware
2 mins
New strain of malware steals credit card info from local businesses
The latest strain of malicious software targets everything from pet stores and movie theaters to restaurants and credit unions. Called GamaPOS, the malware already...
mers malware
1 min
Viral outbreak inspires MERS-themed malware
A human virus is a lot like a piece of malware, “downloading” itself into your system and draining your vital resources for its own...
An ethernet cable in front of a stock whooshing blue background that I guess is supposed to represent the internet?
1 min
Disable IPv6 for better VPN protection
Note: There is no need to disable IPv6 if you use the ExpressVPN app’s IPv6 Leak Protection feature, which is available on our Windows,...
An eye with a fingerprint.
2 mins
How hackers can use your fingerprints to frame you
Find out how hackers can use a camera, a computer program, and some wood glue to recreate your fingerprints.
mspy hacked
3 mins
Pot, meet kettle: Spyware maker compromised, denies everything
Hackers exposed monitoring software developer mSpy by accessing 400,000 records of user details and payment transactions.
who-is-access
3 mins
Protecting your digital rights: Who is Access?
Digital freedoms are under attack worldwide. In countries like France and Turkey, governments are pushing for greater access to citizens' data without their consent,...
3.5" Internal hard drive.
3 mins
The Equation Group, hard drives and the Death Star of malware
Researchers at Kaspersky Lab have uncovered a new cyber-espionage toolset that possesses more than a passing resemblance to similar kits used by US intelligence...

Featured Posts

ExpressVPN is proudly supporting
  • logo_1
  • logo_2
  • logo_3
  • logo_4

Live chat

Need help? Chat with us!

Online