-
Ultimate guide to mobile security for iPhone and Android devices
While most of us know to be vigilant when it comes to the security of our desktops and laptops—installing antivirus programs and regularly scheduling system scans—our mobile phones often aren’t ...
-
What is ransomware? How it works and how to prevent attacks
You sit down at your computer, ready to start your day—but instead of your desktop, you see a message: "Your files have been encrypted. Pay $500 in Bitcoin within 72 hours or lose everything." Photo...
-
12 best Christmas TV episodes ever
It’s tradition to create episodes of popular TV shows specifically geared toward Christmas. Sometimes they are inserted naturally into the season during December, but other times they serve as viewi...
-
Introducing Threat Manager: Stop apps from tracking you
We just launched an exciting new feature that blocks third-party trackers that may be hiding in your iPhone, iPad, Android, Mac, Windows, and Linux apps. It’s called Threat Manager. You may have hea...
-
How to gift Bitcoin or other cryptocurrencies this Christmas
Need a belated, last-minute Christmas present on the fly? Why not give the gift of cryptocurrencies this Christmas—specifically, Bitcoin. Bitcoin doesn’t exist in physical form. The cryptocurrency...
-
ExpressVPN officially joins Kape Technologies
We’re excited to share with you that ExpressVPN has, as of today, officially joined forces with Kape Technologies to together advance the state of privacy and security technology. As we shared when ...
-
Flowchart: Which Christmas movie should you stream?
Now that you've figured out what to watch, find out where to stream the best Christmas movies!
-
Log4j vulnerability: ExpressVPN delivers protection against Log4Shell
This post was originally published on December 14, 2021. ExpressVPN has identified and rolled out a protective layer for the Log4j vulnerability known as Log4Shell. All ExpressVPN users now benefit fr...
-
The safe browsing guide: 21 ways to protect yourself online
Browsers are slowly replacing operating systems as the central interface for devices. Already, they are the primary application on most computers. Similar to how our smartphones have become our camera...
-
Infographic: 6 tips to safer social media use
Using social media does mean giving up our personal information, whether it's to our followers or the tech companies who run social platforms. This is an issue, especially considering the amount of ti...
Featured
