ExpressVPN launches “Signals of Trustworthy VPNs” with CDT
NOTE: This post was originally published on October 16, 2018 Crunchy? Extra creamy? Reduced fat? Old-fashioned, whatever that means? We’ve all had that feeling of being...
The art of social engineering: Are you being conditioned?
As we get better at securing our computer systems, we are discovering that the weakest line of defense is, in fact, the human being....
Wi-Fi security: How to stay safe while connected
Wireless security has two components: Authentication and secrecy. And, in theory, responsibility for network security lies with both operators and users. Operators of Wi-Fi...
ExpressVPN fixes “Voracle” compression vulnerability in apps
Update: Since October 24, 2018, our manual config servers are not vulnerable to the VORACLE exploit. At a Black Hat Briefing in August 2018, the...
6 easy ways to improve your online privacy and security
To protect your online privacy, look to the security of your devices, social media, logins, chat apps, and more.
How brute-force attacks reveal your passwords
A brute-force attack is an attempt to discover—or “crack”—your password through repeated guessing. On public-facing login screens, most web services limit the number of times...
The secret codes that nobody can crack
Remember back in school, when you and your best friend would exchange secret notes across the classroom in code? The two of you muffling...
4 ways to back up your data securely
Photos, documents, saved video games, and old emails: We accumulate a lot of data throughout our lives. And just like our parents’ attic, our...
How to make a small server for your home
A guide to installing a small server in your own home, and cool things to do with it. Lexie shows us how with Linux (Ubuntu).
Girl Scouts are our next wave of cybersecurity experts
Do you know what badges Girl Scouts are collecting these days? It’s not just Hiker, Making Friends, and Cookie CEO anymore. With a strong...