Can my router catch a virus?
A router works like a small computer and runs customized software designed for a particular purpose. Routers have operating...
Internet hacks: Phishing and spearphishing explained
Phishing, pronounced fishing, is a social engineering technique designed to steal passwords, credit card details, and other sensitive information....
How spam became internet spam, via forum spam, and email spam....
Disclaimer: ExpressVPN does not endorse spam of any kind. Or Spam.
Once upon a time, Spam was just a tin...
How botnets use you to make money
Robot Networks (Botnets) are almost exclusively created with the purpose of financial gain, though some botnet attacks are politically...
Ask Lexie! How to fix a hacked MacBook
Hi, I’m Lexie, and I work for ExpressVPN’s security team.
ExpressVPN receives lots of emails and comments from users and...
Internet hacks: The difference between DoS and DDoS attacks
While often referred to in the media as hacking, a Denial of Service Attack (DoS) is not an intrusion...
Do I need antivirus on my computer?
Tl;dr: No, antivirus software no longer reliably protects against malware threats. To understand why, read below about the history...
What happens when good Chrome extensions turn bad
In one of the strangest (and funniest) web faux pas of the century, Wired magazine recently published an article...
As users turn to ad blockers, sites start blocking users
Last December, Forbes started blocking access to visitors who used ad-blocking software. Visitors with any type of ad blocker...
5 smart devices that are dumb on privacy
This post was originally published on January 26, 2016.
Anything is possible in the Internet of Things, except maybe privacy.
It’s...