Lexie

Lexie

Lexie is the blog's resident tech expert and gets excited about empowerment through technology, space travel, and pancakes with blueberries.

  • How to replace old or damaged hard drives securely

    How to replace old or damaged hard drives securely

    If you are like most other computer users, you’ll rarely throw away or delete data. And with disk space becoming cheaper and cheaper, you’ll rarely have to. But if you do ever need to get rid of a...

    Lexie 13.06.2016 4 mins
  • How to stop advertisers from tracking your browsing habits

    How to stop advertisers from tracking your browsing habits

    The primary ways of de-anonymizing users on the internet is through the use of cookies and personal information. Web sites can load a cookie onto your browser with a unique identifier, which allows th...

    Lexie 07.06.2016 4 mins
  • Internet hacks: Phishing and spearphishing explained

    Internet hacks: Phishing and spearphishing explained

    Phishing, pronounced fishing, is a social engineering technique designed to steal passwords, credit card details, and other sensitive information. The ultimate goal is to use these credentials to gain...

    Lexie 23.05.2016 4 mins
  • Ask Lexie! How to fix a hacked MacBook

    Ask Lexie! How to fix a hacked MacBook

    Hi, I’m Lexie, and I work for ExpressVPN’s security team. ExpressVPN receives lots of emails and comments from users and readers about our blog posts and guides. Some of these inquiries may be use...

    Lexie 25.04.2016 2 mins
  • Do I need antivirus on my computer?

    Do I need antivirus on my computer?

    Tl;dr: No, antivirus software no longer reliably protects against malware threats. To understand why, read below about the history of malware, what antivirus software does, and whether you truly need ...

    Lexie 11.04.2016 6 mins
  • What the Panama Leak means for corruption and privacy

    What the Panama Leak means for corruption and privacy

    Last Sunday (April 3, 2016) the International Consortium of Investigative Journalists (ICIJ) and the Sueddeutsche Zeitung (SZ) released the Panama Papers to media outlets around the world. The Panama ...

    Lexie 06.04.2016 8 mins
  • Internet hacks: Brute-force attacks and how to stop them

    Internet hacks: Brute-force attacks and how to stop them

    A brute-force attack, also called exhaustive key search, is essentially a game of guessing and can be executed against any type of authentication system. Encryption keys are particularly vulnerable to...

    Lexie 29.03.2016 6 mins
  • How much can metadata reveal? Just ask John McAfee

    How much can metadata reveal? Just ask John McAfee

    Metadata can often reveal more about a file than the actual data. A 2012 manhunt illustrates this point. The case concerned John McAfee, famous for the antivirus company named after him and for being ...

    Lexie 14.03.2016 1 mins
  • The court case that will define technology and privacy for decades

    The court case that will define technology and privacy for decades

    On December 2, 2015, the married couple Syed Rizwan Farook and Tashfeen Malik shot and killed fourteen people at a training event for the Department of Health in San Bernardino, California, where Faro...

    Lexie 07.03.2016 10 mins
  • OnionShare: Secure and anonymous file sharing

    OnionShare: Secure and anonymous file sharing

    Sharing files can be a hassle. Even when in the same room as the person you want to share files with, the easiest option is often to share them with a USB stick. But when you’re hundreds or thousand...

    Lexie 29.02.2016 5 mins
Get Started