-
How to replace old or damaged hard drives securely
If you are like most other computer users, you’ll rarely throw away or delete data. And with disk space becoming cheaper and cheaper, you’ll rarely have to. But if you do ever need to get rid of a...
-
How to stop advertisers from tracking your browsing habits
The primary ways of de-anonymizing users on the internet is through the use of cookies and personal information. Web sites can load a cookie onto your browser with a unique identifier, which allows th...
-
Internet hacks: Phishing and spearphishing explained
Phishing, pronounced fishing, is a social engineering technique designed to steal passwords, credit card details, and other sensitive information. The ultimate goal is to use these credentials to gain...
-
Ask Lexie! How to fix a hacked MacBook
Hi, I’m Lexie, and I work for ExpressVPN’s security team. ExpressVPN receives lots of emails and comments from users and readers about our blog posts and guides. Some of these inquiries may be use...
-
Do I need antivirus on my computer?
Tl;dr: No, antivirus software no longer reliably protects against malware threats. To understand why, read below about the history of malware, what antivirus software does, and whether you truly need ...
-
What the Panama Leak means for corruption and privacy
Last Sunday (April 3, 2016) the International Consortium of Investigative Journalists (ICIJ) and the Sueddeutsche Zeitung (SZ) released the Panama Papers to media outlets around the world. The Panama ...
-
Internet hacks: Brute-force attacks and how to stop them
A brute-force attack, also called exhaustive key search, is essentially a game of guessing and can be executed against any type of authentication system. Encryption keys are particularly vulnerable to...
-
How much can metadata reveal? Just ask John McAfee
Metadata can often reveal more about a file than the actual data. A 2012 manhunt illustrates this point. The case concerned John McAfee, famous for the antivirus company named after him and for being ...
-
The court case that will define technology and privacy for decades
On December 2, 2015, the married couple Syed Rizwan Farook and Tashfeen Malik shot and killed fourteen people at a training event for the Department of Health in San Bernardino, California, where Faro...
-
OnionShare: Secure and anonymous file sharing
Sharing files can be a hassle. Even when in the same room as the person you want to share files with, the easiest option is often to share them with a USB stick. But when you’re hundreds or thousand...