Is hotel Wi-Fi safe?
Travel is picking up in some parts of the world. If you’re in a hotel, take these simple precautions when you go online.
What are white hat, gray hat, and black hat hackers?
What makes a hacker good or bad? Their actions and intentions make them white hat, black hat, or gray hat.
Explainer: Lapsus$ hacking group
Talented (suspected) teenagers on a hacking rampage have been announcing their cyberattacks on Telegram. Read on.
4 ways to hide from drone surveillance
Commercial drones are common sights—but they might be watching you. Here are ways to hide from drones and avoid surveillance from above.
What to do if your social media account gets hacked
How to recover a hacked or hijacked Facebook, Twitter, Instagram, or LinkedIn account. What to do after a social media hack.
What you should do when deleting an app from your phone
Removing an app from your phone does not mean you’ve deleted your account on the service. The app maker still has your information.
Log4j vulnerability: ExpressVPN delivers protection against Log4Shell
ExpressVPN has rolled out a protective layer for the Log4j vulnerability. All ExpressVPN users benefit from this protection.
8 of the biggest crypto thefts of all time
The world just saw what was possibly the largest crypto heist yet—after which the hacker returned all of the stolen 600 million USD.
Is this attack a hack… or hacktivism?
We take a look at examples of hacktivism, well-known groups like Anonymous, and the pros and cons of hacktivism.
What is Pegasus spyware? And how to protect your phone
Pegasus is phone hacking software used by governments. Read how it can be secretly installed on your phone remotely.