ExpressVPN reviews the 3 best Bitcoin wallets for iOS
*Are you looking for the best Bitcoin Wallets for Android? Click here.* As recently as 2014, there was only one...
Pokémon, no! 9 privacy issues to consider when playing Pokémon Go
NOTE: This post was originally published on July 13, 2016 Within just a few days of its launch, Pokémon Go...
How to secure your Bitcoins and prevent irrecoverable wallet loss
Your Bitcoin wallet is like a Swiss bank account in your pocket. It’s not easy for others to view...
How to replace old or damaged hard drives securely
If you are like most other computer users, you’ll rarely throw away or delete data. And with disk space...
How to stop advertisers from tracking your browsing habits
The primary ways of de-anonymizing users on the internet is through the use of cookies and personal information. Web sites...
Internet hacks: Phishing and spearphishing explained
Phishing is a social engineering technique to steal passwords, credit card details, and other information. Learn how to protect yourself.
Ask Lexie! How to fix a hacked MacBook
Hi, I’m Lexie, and I work for ExpressVPN’s security team. ExpressVPN receives lots of emails and comments from users and...
Do I need antivirus on my computer?
Tl;dr: No, antivirus software no longer reliably protects against malware threats. To understand why, read below about the history...
What the Panama Leak means for corruption and privacy
Last Sunday (April 3, 2016) the International Consortium of Investigative Journalists (ICIJ) and the Sueddeutsche Zeitung (SZ) released the...
Internet hacks: Brute-force attacks and how to stop them
A brute-force attack, also called exhaustive key search, is essentially a game of guessing and can be executed against...