-
ExpressVPN survey reveals Americans do care about privacy after all
NOTE: This post was originally published on June 13, 2019 A representative survey, commissioned by ExpressVPN and undertaken by Propeller Insights, produced many surprising results while confirming so...
-
Why you shouldn’t ignore ‘Update Your Device’ messages
It’s pretty much second nature at this point. We start our laptops and hunker down in our seats, ready to power through the day with a steaming cup of coffee. As we browse through our daily calendar...
-
6 ways to protect your online finances... In the physical world
From VPNs to antivirus software, there is no shortage of precautions to take when protecting your personal banking online. But your financial information can be just as vulnerable to theft in the phys...
-
Why should I use two-factor authentication?
You might have skipped over your email provider’s prompt: Turn on two-factor authentication. Two-factor authentication, or 2FA, is a secondary security measure for logging into an online account, wh...
-
15 best apps for online privacy in 2025 (iOS & Android)
Navigating the privacy minefield that is today’s internet can be a challenge. With cybersecurity incidents like the Equifax hack and state-sponsored targeting of U.S. companies appearing so frequent...
-
9 things you can do with a home server
Running your own server at home can be cheap and requires only basic knowledge of the command line. An old laptop can be converted into a server without any physical modifications, and even a modest d...
-
11 massive government data breaches
We’re constantly hearing about data breaches lately—and it’s no wonder, given that billions of personal records are exposed every year. While the majority of cybersecurity headlines center ar...
-
What is a Bitcoin node and who needs one?
The Bitcoin network does not have a central authority that decides which transactions are valid and which are not. There is nobody who issues coins, and nobody who can take them back. Nobody knows how...
-
What is cryptojacking? How to detect & prevent hidden crypto mining
Cryptojacking is when hackers run cryptomining malware on your device without you knowing. This lets them secretly mine cryptocurrency without your knowledge or consent. Unlike other types of malware,...
-
Why you can't judge a VPN by its server count
When it comes to choosing a VPN company, there are many things you'll want to take into account, such as do they provide good speeds? Do they have apps for all my devices? And are they well known and ...
Tips & tricks
