A shield at the top of a ladder graph indicating the pathways to cybersecurity jobs..
4 mins

Interested in cybersecurity jobs? You’ll need these skills

Cybersecurity is a lucrative field and professionals are in high demand.
Mask with a smiley face.
2 mins

Face masks do help evade facial recognition tech—for now

A study by the U.S. government found that even some highly accurate algorithms failed to match photos of masked individuals to their pictures up to 50% of the time.
An illustratin of a woman juglging different faces.
10 mins

How (and why) to keep multiple online identities separate

To keep an online persona separate from, and unconnected to, a legal identity, it’s important to understand which identifiers are commonly used to de-anonymize a person.
Laptop screen with a virus slashed out.
3 mins

To combat fake pandemic news, countries beef up censorship

These new measures suppressing press and internet freedoms are ripe for abuse.
The White House has secretly granted the CIA sweeping powers to conduct cyberattacks.
2 mins

The CIA was secretly granted much more freedom to carry out cyberattacks

Since 2018, the agency has been permitted to approve its own operations, no longer needing White House approval.
Wrapping around a hexagonal bar.
6 mins

Modern-day encryption has ancient cryptography beginnings

How to communicate privately has fascinated mathematicians for millennia, possibly as far back as ancient Egypt. Greek strategists would often make use of simple...
New legislation to impact data processing in the EU and Brazil
3 mins

Big changes to data protection laws in the EU and Brazil

A key ruling in the EU and Brazil's version of the GDPR means privacy safeguards just got strengthened for hundreds of millions of people.
CCTV camera aimed at a child wearing a mask.
4 mins

New semester, new surveillance: How schools plan to monitor students

Amid a pandemic, schools that decide to reopen might implement various invasive methods of monitoring students.
A collage of images related to mobile devices, e.g.: a Sim card and a USB socket.
1 min

Infographic: How your phone gives up your privacy

This visual guide covers mobile security tips, tricks, and best practices and will help secure your phone from the most determined of hackers.
Statue of Liberty torch with a hand reaching down.
5 mins

U.S. Senate to vote on EARN IT bill, endangering encryption

The widely criticized EARN IT bill, which might eradicate end-to-end encryption, is now up for voting by the U.S. Senate.

Featured Posts

ExpressVPN is proudly supporting

  • logo_1
  • logo_2
  • logo_3
  • logo_4
Need help? Chat with us!

Live chat

Online