Trash icon filled with pictures and speech bubbles.
1 min
Instagram stored messages and photos you wanted to delete
An independent security researcher found photos and messages more than a year after he deleted them.
An envelope with a lock on it.
6 mins
How to improve your email security
No matter if it’s private communication or business, your emails contain practically everything there is to know about you. From your emails, anyone can learn...
Riana Pfefferkorn headshot.
8 mins
Interview: Encryption expert Riana Pfefferkorn on the erosion of online free speech
The effect of the EARN IT Act, the problem with the U.S. concept of privacy, the emergence of regional internets, and more.
A dismantled phone and screwdriver.
3 mins
Lockdowns highlight the need to repair devices ourselves
Brands create obstacles to fixing our devices affordably or at all. And with service centers closed during the pandemic, consumers are left with no options.
A shield at the top of a ladder graph indicating the pathways to cybersecurity jobs..
4 mins
Interested in cybersecurity jobs? You’ll need these skills
Cybersecurity is a lucrative field and professionals are in high demand.
Mask with a smiley face.
2 mins
Face masks do help evade facial recognition tech—for now
A study by the U.S. government found that even some highly accurate algorithms failed to match photos of masked individuals to their pictures up to 50% of the time.
An illustratin of a woman juglging different faces.
10 mins
How (and why) to keep multiple online identities separate
To keep an online persona separate from, and unconnected to, a legal identity, it’s important to understand which identifiers are commonly used to de-anonymize a person.
Laptop screen with a virus slashed out.
3 mins
To combat fake pandemic news, countries beef up censorship
These new measures suppressing press and internet freedoms are ripe for abuse.
The White House has secretly granted the CIA sweeping powers to conduct cyberattacks.
2 mins
The CIA was secretly granted much more freedom to carry out cyberattacks
Since 2018, the agency has been permitted to approve its own operations, no longer needing White House approval.
Wrapping around a hexagonal bar.
6 mins
Modern-day encryption has ancient cryptography beginnings
How to communicate privately has fascinated mathematicians for millennia, possibly as far back as ancient Egypt. Greek strategists would often make use of simple...

Featured Posts

ExpressVPN is proudly supporting
  • logo_1
  • logo_2
  • logo_3
  • logo_4

Live chat

Need help? Chat with us!

Online