Tor Onion with arrow through the middle

Tor outage: How a major attack felled the onion network

3 min read
The Tor Network suffered a serious outage this month. We look at why Tor is not entirely decentralized, and how this affects its security.
Must-see sites on the dark web

The top 9 .onion websites from the depths of the dark web

5 min read
Looking to explore the depths of the dark web? There’s so much to see, where do you start? ExpressVPN lists the must-see .onion sites for 2021.
vulnerable-home-devices

5 vulnerable smart devices in your home right now

5 min read
IoT appliances at home are entry points for hackers to access your network. Learn how to protect your vulnerable devices.
Message bubbles in different colors.

The best messaging apps for privacy and security in 2021

12 min read
There are dozens of messaging apps to choose from, but which ones provide the best privacy security?
How new parents can protect the privacy of their babies and children.

5 ways parents can stay smart about children’s privacy

6 min read
Had a Covid baby? It’s never too early to stay vigilant and protect their privacy.

Contact tracing at work: A growing reality

3 min read
Tor Onion with arrow through the middle

Tor outage: How a major attack felled the onion network

3 min read
The Tor Network suffered a serious outage this month. We look at why Tor is not entirely decentralized, and how this affects its security.
vulnerable-home-devices

5 vulnerable smart devices in your home right now

5 min read
IoT appliances at home are entry points for hackers to access your network. Learn how to protect your vulnerable devices.
Message bubbles in different colors.

The best messaging apps for privacy and security in 2021

12 min read
There are dozens of messaging apps to choose from, but which ones provide the best privacy security?

How ExpressVPN ensures no one can slip malware into your apps

3 min read
It takes many people, working across many systems, to produce and maintain an ExpressVPN app. To do it safely, we have to make sure...
An illustration of a massive iceberg, with only the tip showing above the water.

Why you can’t judge a VPN by its server count

6 min read
When it comes to choosing a VPN company, there are many things you'll want to take into account, such as do they provide good...
An illustration of a leaking computer cable viewed through a magnifying glass.

ExpressVPN leak testing tools

5 min read
The ExpressVPN Leak Testing Tools are an extensible suite of Python tools designed for both manual and automated leak testing of VPN applications. Developed by...
What is a DNS leak?

What are DNS leaks?

2 min read
Tor Onion with arrow through the middle

Tor outage: How a major attack felled the onion network

3 min read
The Tor Network suffered a serious outage this month. We look at why Tor is not entirely decentralized, and how this affects its security.
controller connected to surveillance camera

Top 6 video games that will change how you view privacy

9 min read
Play through our picks for some of the best video games about hacking, surveillance, and privacy.
how to protect your data after you die

How to protect your data when you die

3 min read
It’s not a pleasant thought. But we owe it to ourselves to safeguard our digital assets—like our social media accounts—just the way we would for physical ones.

Contact tracing at work: A growing reality

3 min read
Linux Tux mascot emerging from egg shell

Revive your old computer by installing Linux

8 min read
Android robot on a phone screen.

ExpressVPN launches new privacy and security features on Android

3 min read
The first new feature is Protection Summary, which lets users see how and when they're being protected by a VPN.

New partnership brings ExpressVPN protection to LastPass users

2 min read
Starting today, all new and existing LastPass Premium and Families subscribers will be offered a 30-day free trial of ExpressVPN. Also: Win a LastPass subscription!

ExpressVPN beta launches Lightway, a VPN protocol for the modern internet

2 min read
Most VPN services rely on a standard set of protocols—methods by which your device connects to a VPN server—each with its own strengths and...