Tech safety for survivors of domestic violence
Take steps to assert your digital autonomy, prevent stalking, and regain control over your communications and information.
Cybersecurity lessons: Safer private keys with Shamir’s Secret Sharing
Learn how digital certificates work and why Shamir’s Secret Sharing is a secure method for storing private keys.
Cybersecurity lessons: Risk of email takeover via a 4th-party provider
ExpressVPN's Security Team investigated a bug that could have been exploited by signing up on Mailgun and hijacking an email subdomain.
Cybersecurity lessons: Privilege escalation via file read/write
How a highly privileged process interacting with a lower-privilege user space can lead to attackers elevating their access or a DoS attack.
Cybersecurity lessons: A PATH vulnerability in Windows
Our cybersecurity experts discuss the PATH environment variable and the security implications of having it misconfigured.
The internet is safer now—but a VPN is still essential protection
The internet is a far more encrypted place than it was 10 years ago, but privacy and security experts still recommend a VPN for most users.
Cybersecurity’s next frontier: Space
The world is waking up to a growing need to protect satellites and other space equipment.
Cybersecurity lessons: Flaw in Zendesk file-upload feature
Our cybersecurity team worked with Zendesk, a support software provider, to fix a flaw in its file-upload system. Here's a play-by-play of how we did it.
Government hacking: How countries surveil their own citizens
There have been numerous incidents in which governments have broken into encrypted apps. This puts your privacy at risk and raises cybersecurity concerns.
How to hide your sensitive pictures
We’re not judging your naked selfies or NSFW pictures. But here’s how to hide them on your iPhone or Android, or in secure cloud storage.