Net neutrality is important, and we need to fight for it
Net neutrality (before 2003, known as “common carrier concept”) describes the idea that internet service providers (ISPs) should route...
What makes a cryptocurrency Bitcoin?
According to listings on coinmarketcap.com, there are now six major cryptocurrencies that all claim to be Bitcoin, and more...
6 features we actually want on our iPhones
New phones are exciting. They bring new features, make existing features more powerful and get us excited about spending...
9 women tech activists to follow on Twitter
Hi! I wanted to share my favorite women tech activists to follow on Twitter.
These women all work to keep...
What is OPSEC and why do you need it?
Keeping your communications secure is one of the most difficult challenges. No matter if you’re talking about business secrets,...
Why websites should sprinkle salt on their hashes to protect your...
Despite their shortcomings, passwords are still the de facto standard for authentication on the web.
ExpressVPN has already written about...
Can my router catch a virus?
A router works like a small computer and runs customized software designed for a particular purpose. Routers have operating...
What is a transparent proxy?
A transparency proxy is used for censorship and unblocking content. Here's how to detect and bypass a transparency proxy.
How botnets use you to make money
Robot Networks (Botnets) are almost exclusively created with the purpose of financial gain, though some botnet attacks are politically...
Ask Lexie! How to fix a hacked MacBook
Hi, I’m Lexie, and I work for ExpressVPN’s security team.
ExpressVPN receives lots of emails and comments from users and...