Google Photos icon disintegrating.
6 mins
Top cloud services to store photos online (free and paid)
With Google Photos discontinuing free unlimited storage, we list other cloud storage options for your photos.
Speech bubbles with a thumbs down and frowning face.
3 mins
Signs that your child is being cyberbullied
We list common examples of cyberbullying and share signs that your child is a victim.
16 mins
13 more surveillance-themed movies and shows
Our new picks for more entertaining movies and shows about privacy and surveillance.
App with military camouflage and an error icon in the top right corner.
5 mins
5 times military secrets were exposed in apps
We take a look at how military personnel have inadvertently revealed sensitive locations through fitness apps, flashcard apps, and more.
Pride flag with a padlock.
4 mins
Online privacy and safety for the LGBTQ+ community
This Pride Month, we take a look at issues surrounding online privacy among the LGBTQ+ community.
Cross health symbol with Wi-Fi signal.
5 mins
The rise of telehealth: What it means for patient privacy
The increased adoption of telehealth services across the globe brings with it new and unprecedented privacy and security challenges.
Pencil eraser wiping a smartphone.
2 mins
How to wipe your iPhone or Android before selling it
Failing to correctly wipe your smartphone could leave your information vulnerable for access by its next owner. Here’s how to do it.
Amazon logo arrows pointing to toggle off.
2 mins
How to opt out of Amazon Sidewalk and stop sharing internet with neighbors
Got an Echo or Ring at home? Starting June 8, Amazon will enroll all devices to its Sidewalk program, which lets users share each other's Wi-Fi.
Red circle with cross and mouse cursor.
4 mins
How reputation management can help you stay private
Online reputation management (ORM) isn’t just for celebrities and politicians. Regular individuals can use these paid services to control the flow of their personal data.
Key with cryptocurrency symbol.
3 mins
Frightening reality: You can buy ransomware as a service
Ransomware attacks were once carried out by skilled hackers. Now, anyone with a credit card can theoretically launch them. Case in point: the Colonial Pipeline hack.

Featured Posts

ExpressVPN is proudly supporting
  • logo_1
  • logo_2
  • logo_3
  • logo_4

Live chat

Need help? Chat with us!

Online