A comparison of two-factor authentication methods: Which is best for you?
Two-factor authentication makes it impossible for hackers to break into your accounts by brute-force and even protects you if the hackers get your password....
I’m sorry, Dave. I’m afraid I can’t do that: When virtual assistants go very,...
The Wall Street Journal estimates that one million IoT devices were recently used by hackers to carry out a glut of DDoS attacks. But it’s...
9 women tech activists to follow on Twitter
Hi! I wanted to share my favorite women tech activists to follow on Twitter. These women all work to keep the internet open and our...
The EU want to tax Hyperlinks. Sign the Save the Link petition to stop...
The EU want to put a tax on internet links, which is absurd. OpenMedia is fighting back with their Save the Link campaign.
Take our quiz: Cybersecurity heroes
How much do you know about the big hitters of internet freedom, privacy, and security? Take our quiz to find out!
Who can see your data when you visit a non-encrypted HTTP site?
Using a VPN is good practice for every type of connection, but can be particularly useful when browsing unsecured HTTP websites.
Unhackable notifications: It’s easy to encrypt Facebook with a PGP key
If you've ever wanted to optimize your online security with PGP keys, start with Facebook’s encrypted notifications feature.
ExpressVPN’s top 10 blogs of 2016
NOTE: This post was originally published on January 27, 2017 ExpressVPN put out more content in 2016 than any year previously. Here's the best of...
Five BIG information security predictions for 2017
A year ago ExpressVPN made some predictions about what might happen in 2016. Some of these bold prophecies turned out to be correct, others...
The Siri-ous benefits and dangers of voice technology
“Hey, Siri” Ask any iOS user if they’ve uttered the above, and they’ll share personal anecdotes of sketchy queries and hilarious replies. What most people...