-
Internet hacks: Brute-force attacks and how to stop them
A brute-force attack, also called exhaustive key search, is essentially a game of guessing and can be executed against any type of authentication system. Encryption keys are particularly vulnerable to...
-
What happens when good Chrome extensions turn bad
In one of the strangest (and funniest) web faux pas of the century, Wired magazine recently published an article accidentally referring to Donald Trump as someone with teeny-tiny hands. How did it hap...
-
Incredible! You found all the eggs! - Now closed
**Sorry! This competition is now closed. Subscribe to the ExpressVPN blog to get news of the next awesome competition and enjoy the best privacy content on the Internet.** WINNER! Ben, who stated: Two...
-
The court case that will define technology and privacy for decades
On December 2, 2015, the married couple Syed Rizwan Farook and Tashfeen Malik shot and killed fourteen people at a training event for the Department of Health in San Bernardino, California, where Faro...
-
OnionShare: Secure and anonymous file sharing
Sharing files can be a hassle. Even when in the same room as the person you want to share files with, the easiest option is often to share them with a USB stick. But when you’re hundreds or thousand...
-
ExpressVPN 5.0 for Windows is waiting to meet you!
Click here for the latest ExpressVPN software for Windows The newest ExpressVPN app for Windows is finally available, and it’s just dying to say hello! We didn’t think we could do it, but we’ve ...
-
Guide to stronger passwords – Part 3 (Diceware)
This is Part 3 of our stronger password series. For the other parts, click below: Part 1 (Two-factor authentication) Part 2 (Password managers) Generate secure and memorable passwords with Diceware If...
-
Et tu, Zuckerberg? Facebook and Google join Apple encryption row
Our privacy rights have taken a hit this week -- and we are not entertained. Fortunately, we have some mighty gladiators fighting in our corner. The recent FBI court case against Apple is a threat to ...
-
7 Biggest cyber attacks in history: Key lessons & prevention tips
Cyber attacks aren’t just IT problems anymore. They shape economies, expose government secrets, and bring corporations to their knees. Some have shut down fuel pipelines, leaked millions of credit c...
-
Guide to stronger passwords, Part 2 (password managers)
This is Part 2 of our stronger password series. For the other parts, click below: Part 1 (Two-factor Authentication) Part 3 (Diceware) In Part 1 of our Guide to Stronger Passwords, we explained two-fa...
Tips & tricks
