Tag: Technology

An illustration of a laptop held by puppet strings.
2 mins

What are botnets, and how do you protect against them?

Botnets are large networks of hijacked devices (robots) that can be remotely controlled by their creator. Mainly run for profit...
The iPhone incoming call screen, except both the icons say accept. Even the decline one. Nice.
1 min

FaceTime flaw lets people hear you, before you even answer

Think twice before cursing that ex who won’t stop calling: A newly found bug in Apple’s FaceTime means someone...
An Australian flag sits atop a series of alphanumeric digits.
2 mins

Here’s why Australia’s cybersecurity bill is a terrible idea

Despite international protest, Australia has passed a new bill that essentially outlaws encryption technology, making its population of 25...
3 mins

Cloudy skies ahead: LA is suing the Weather Channel for selling...

The city of LA is suing the Weather Company, a subsidiary of IBM, for secretly mining and selling user...
The words "Best of the Blog 2018" on a soothing green background.
1 min

The 9 best ExpressVPN blogs of 2018

2018 was a bumper year for ExpressVPN! Here's the best of 2018 from the best VPN blog in town: 1....
An illustration of a whistle decorated with the Stars and Stripes.
4 mins

5 famous whistleblowers who risked everything

“See something, say something” is a safety and awareness campaign running across multiple cities in the United States. If you...
A warning sign with a skull and crossbones and the word "Tech".
4 mins

What are the most dangerous technologies of the surveillance age?

Technology such as encryption, VPNs, and Tor can help us maintain and defend our privacy online. But technology can also...
An illustration of a pixelated padlock
2 mins

What will happen to internet privacy in the future?

Unfortunately, we have reached a point where the internet doesn’t work correctly unless we sacrifice some of our privacy....
An illustration of an ostrich burying its little head in the sand.
3 mins

How plausible deniability can protect your data

Plausible deniability allows individuals to claim they had no involvement in an action taken by others (or, in some...
An illustration of an atomic bomb explosion. Because this is serious stuff.
3 mins

An introduction to threat modeling

If you are always worried about your ISP, corporations, and the government spying on you, maybe it’s time to...
1 min
1 min

Demo Canva and Typeform Shortcode

3 mins
3 mins
4 mins
1 min

Featured Posts

1 min
3 mins
5 mins
3 mins
3 mins

How to gift Bitcoin this Christmas

3 mins

ExpressVPN is proudly supporting

  • logo_1
  • logo_2
  • logo_3
  • logo_4
Need help? Chat with us!
This site is registered on wpml.org as a development site.