An illustation of a phone with "e-signature" written on it in a cursive font.
4 mins
What is an e-signature, and how does it work?
Ever signed a job contract, leased an apartment, or got a loan online? You may have benefited from an e-signature app. Here are seven to try.
Bird's-eye view of a brain seen through military binocular vision.
3 mins
Tech that can spy on our brains is coming
Almost ten years ago, Facebook launched its facial recognition tool, which could identify people in photos uploaded onto the platform. Since then, we have...
An illustration of an iPhone. There are lots of app icons on the screen. But wait! There's a twist. All the icons are, in fact, the location icon (as used on digital maps everywhere).
4 mins
Would you trade your privacy for free apps? Some don’t have a choice.
Every time you grant an app permission to access your contacts or listen to your microphone, you’re giving the app developer carte blanche to...
A white coin-shaped circle on a purple background. Within the coin-shaped circle are the three wavy lines of the Libra logo.
5 mins
Facebook’s cryptocurrency has governments scrambling
There are over 2,000 cryptocurrencies, tokens, and blockchain instruments commonly traded on more than 250 platforms around the world. Some of these currencies are...
A series of ones and zeroes making up the image of an eye.
3 mins
What is spyware and how do I remove it?
Spyware is software secretly installed on your machine with malicious intent. Here's how to protect against it.
An illustration of a laptop, but the screen is the classic warning sign. You know, the triangle with an exclamation point in it.
4 mins
4 new cybersecurity threats in 2019
Cybersecurity threats continue to evolve, and with more consumers making transactions online, you can be sure that hackers aren’t far away.
2019 ExpressVPN Scholarship winner
5 mins
Announcing the winner of the 2019 Future of Privacy Scholarship
NOTE: This post was originally published on October 25, 2019 We are excited to announce the winner of the ExpressVPN Future of Privacy Scholarship 2019:...
A representation of the lines a computer makes across a face when trying to search for identifying features.
1 min
Infographic: The rise of facial recognition in airports
In a recent post, we spotlighted the growing use of face scans as a form of identification in airports, especially in the U.S. Here,...
The icon often used to portray an image gallery, but with the icon often used to portray a lock in the position where notifications usually pop up (the bottom right).
3 mins
How to make your photos more private on social media
“A picture is worth a thousand words,” so the old adage goes. Today, with virtually all photos taken digitally and in higher quality, they...
A profile of a shouting person.
3 mins
Why Facebook is the tool of choice for government manipulation
The Global Disinformation Order, a new study by the Oxford Internet Institute, confirms our worst fears about governments’ use of social media to influence...

Featured Posts

ExpressVPN is proudly supporting
  • logo_1
  • logo_2
  • logo_3
  • logo_4

Live chat

Need help? Chat with us!

Online