Filter Posts
Cybersecurity lessons: Monitoring password manager activity
ExpressVPN's Security Team explains how to detect vulnerabilities and attacks on password managers and analyze the risks.
The rise of telehealth: What it means for patient privacy
The increased adoption of telehealth services across the globe brings with it new and unprecedented privacy and security challenges.
How to wipe your iPhone or Android before selling it
Failing to correctly wipe your smartphone could leave your information vulnerable for access by its next owner. Here’s how to do it.
How to opt out of Amazon Sidewalk and stop sharing internet...
Got an Echo or Ring at home? Starting June 8, Amazon will enroll all devices to its Sidewalk program, which lets users share each other's Wi-Fi.
How reputation management can help you stay private
Online reputation management (ORM) isn’t just for celebrities and politicians. Regular individuals can use these paid services to control the flow of their personal data.
Frightening reality: You can buy ransomware as a service
Ransomware attacks were once carried out by skilled hackers. Now, anyone with a credit card can theoretically launch them. Case in point: the Colonial Pipeline hack.
When catfish meets crypto scam on dating apps
Do your attractive matches on dating apps mainly want to talk about a great crypto opportunity? Beware of the latest catfish.
Cypherpunks: Pioneers of online privacy
Encryption was once used exclusively for military purposes. Cypherpunks helped bring the tech into the mainstream.
Your old phone number is putting you at risk
If you’ve ever switched to a new phone number, chances are your old number will be reassigned to someone...
How Google Nest Hub sleep sensors monitor from afar
As Google grows its reach into our lives with hardware devices, is our health data falling into the wrong hands?