Tips & tricks

ftc is authorized to regulate corporate cybersecurity
2 mins

US corporations that skimp on cybersecurity now subject to FTC regulation

NOTE: This post was originally published on September 17, 2015 A US appeals court has recently ruled that the Federal Trade Commission now has the authority...
Stegosaurus.
3 mins

Pixels in images can hack your computer – #WTFWednesday

What’s so dangerous about looking at a picture file in your web browser? In the past, nothing. You loaded the image. It displayed on your...
gamapos malware
2 mins

New strain of malware steals credit card info from local businesses

The latest strain of malicious software targets everything from pet stores and movie theaters to restaurants and credit unions. Called GamaPOS, the malware already...
mers malware
1 min

Viral outbreak inspires MERS-themed malware

A human virus is a lot like a piece of malware, “downloading” itself into your system and draining your vital resources for its own...
An ethernet cable in front of a stock whooshing blue background that I guess is supposed to represent the internet?
1 min

Disable IPv6 for better VPN protection

Note: There is no need to disable IPv6 if you use the ExpressVPN app’s IPv6 Leak Protection feature, which is available on our Windows,...
An eye with a fingerprint.
2 mins

How hackers can use your fingerprints to frame you

Find out how hackers can use a camera, a computer program, and some wood glue to recreate your fingerprints.
mspy hacked
3 mins

Pot, meet kettle: Spyware maker compromised, denies everything

Hackers exposed monitoring software developer mSpy by accessing 400,000 records of user details and payment transactions.
who-is-access
3 mins

Protecting your digital rights: Who is Access?

Digital freedoms are under attack worldwide. In countries like France and Turkey, governments are pushing for greater access to citizens' data without their consent,...
3.5" Internal hard drive.
3 mins

The Equation Group, hard drives and the Death Star of malware

Researchers at Kaspersky Lab have uncovered a new cyber-espionage toolset that possesses more than a passing resemblance to similar kits used by US intelligence...
Fingers typing on a keyboard.
2 mins

Hacktivism and vandalism were the main motivations for DDoS attacks last year

Distributed denial of service (DDoS) attacks are growing in size, frequency and complexity, according to the latest Annual Infrastructure Report from Arbor Networks. The security...
8 mins
2 mins
10 mins
10 mins

What is DNS hijacking?

Featured Posts

2 mins
3 mins
3 mins

What is Freenet?

6 mins
7 mins

ExpressVPN is proudly supporting

  • logo_1
  • logo_2
  • logo_3
  • logo_4
Need help? Chat with us!