Tag: Technology

An illustration of a laptop held by puppet strings.
2 mins
What are botnets, and how do you protect against them?
Botnets are large networks of hijacked devices (robots) that can be remotely controlled by their creator. Mainly run for profit...
The iPhone incoming call screen, except both the icons say accept. Even the decline one. Nice.
1 min
FaceTime flaw lets people hear you, before you even answer
Think twice before cursing that ex who won’t stop calling: A newly found bug in Apple’s FaceTime means someone...
An Australian flag sits atop a series of alphanumeric digits.
2 mins
Here’s why Australia’s cybersecurity bill is a terrible idea
Despite international protest, Australia has passed a new bill that essentially outlaws encryption technology, making its population of 25...
3 mins
Cloudy skies ahead: LA is suing the Weather Channel for selling...
The city of LA is suing the Weather Company, a subsidiary of IBM, for secretly mining and selling user...
The words "Best of the Blog 2018" on a soothing green background.
1 min
The 9 best ExpressVPN blogs of 2018
2018 was a bumper year for ExpressVPN! Here's the best of 2018 from the best VPN blog in town: 1....
An illustration of a whistle decorated with the Stars and Stripes.
4 mins
5 famous whistleblowers who risked everything
“See something, say something” is a safety and awareness campaign running across multiple cities in the United States. If you...
A warning sign with a skull and crossbones and the word "Tech".
4 mins
What are the most dangerous technologies of the surveillance age?
Technology such as encryption, VPNs, and Tor can help us maintain and defend our privacy online. But technology can also...
An illustration of a pixelated padlock
2 mins
What will happen to internet privacy in the future?
Unfortunately, we have reached a point where the internet doesn’t work correctly unless we sacrifice some of our privacy....
An illustration of an ostrich burying its little head in the sand.
3 mins
How plausible deniability can protect your data
Plausible deniability allows individuals to claim they had no involvement in an action taken by others (or, in some...
An illustration of an atomic bomb explosion. Because this is serious stuff.
3 mins
An introduction to threat modeling
If you are always worried about your ISP, corporations, and the government spying on you, maybe it’s time to...
1 min
1 min
Demo Canva and Typeform Shortcode
3 mins
3 mins
4 mins
1 min

Featured Posts

1 min
5 mins
5 mins
Can my router catch a virus?
9 mins
4 mins
ExpressVPN is proudly supporting
  • logo_1
  • logo_2
  • logo_3
  • logo_4

Live chat

Need help? Chat with us!

Online

This site is registered on wpml.org as a development site.