Tag: Cybersecurity

Skull on a virtual shopping cart.
5 mins

What are Amazon unauthorized purchase scams?

Here’s how to spot—and avoid—one of the most common Amazon scams.
Evil twin Wi-Fi
5 mins

What is an evil twin attack?

Connecting to public Wi-Fi? Make sure it’s the right network, not its evil twin.
Robot with call symbols for eyes.
8 mins

7 ways to stop spam calls and robocalls

Fraudsters have your phone ringing day and night? Reclaim your sanity by blocking them. Here’s how.
Scareware pop-up
7 mins

What is scareware?

"You have a virus!" Actually—you probably don't.
Password field with a magnifying glass.
2 mins

How websites check your password

Most modern websites hash passwords. This process converts any string of data into a seemingly random, unreadable string of data.
Key with a price tag.
3 mins

Conti: The most dangerous ransomware gang

We explain Conti, the ransomware group that has crippled Costa Rica, U.S. healthcare networks, and major companies.
An info sign surrounded by dollar signs
4 mins

So your information is on the dark web. What now?

You can’t take it down. But here are the steps to take to protect your identity.
A certificate with a slash through it.
6 mins

Why we’d never install a Trusted Root CA on your device

What is a Trusted Root CA, what could go wrong if a VPN company installs its own, and why we won’t ever do so.
2 mins

Independent audit confirms security of ExpressVPN’s app for Windows

The assessment by cybersecurity firm F-Secure was exceedingly positive.
A laptop masquerading as a bot.
6 mins

What are bots and how do they work?

More than half of all internet traffic is made up of bots. Some make our lives easier, while other have more malicious intention. Join us as we discover the difference.
2 mins
10 mins
10 mins

What is DNS hijacking?

Featured Posts

ExpressVPN is proudly supporting

  • logo_1
  • logo_2
  • logo_3
  • logo_4
Need help? Chat with us!