The listings featured on this site are from companies from which this site receives compensation and some are co-owned by our parent company. This influence: Rank and manner in which listings are presented.
Learn more
The How To Guide was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on The How To Guide are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Latest News

Hackers are actively exploiting vulnerabilities in Fortinet firewalls to deploy ransomware, targeting organizations that have yet to patch their systems. The Mora_001 ransomware gang, which has ties to the notorious LockBit group, has been using two specific Fortinet flaws — CVE-2024-55591 and

Husain Parvez First published on March 21, 2025

A new phishing campaign has been targeting Coinbase users, tricking them into setting up a new wallet with a pre-generated recovery phrase that’s controlled by the attackers. The scam email masquerades as an official communication from Coinbase, instructing users to switch to self-custodial

Anka Markovic Borak First published on March 19, 2025

Amazon Web Services (AWS) is under scrutiny for continuing to host stolen data from victims of three stalkerware apps — Cocospy, Spyic, and Spyzie — weeks after being alerted to its presence. These apps, designed for covert surveillance, secretly extract and upload victims' personal data to

Husain Parvez First published on March 17, 2025

Levi & Korsinsky LLP has launched an investigation into Yahoo over claims that the company unlawfully shared private user information. The law firm is preparing arbitration demands for Yahoo account holders who may have been impacted by improper data sharing. California residents who used Yahoo

Hendrik Human First published on March 17, 2025

PowerSchool, a major provider of education software solutions, was compromised months before its December 2024 data breach, according to a forensic investigation by cybersecurity firm CrowdStrike. The company had initially reported that hackers gained unauthorized access between December 19 and

Husain Parvez First published on March 16, 2025

The UK government has quietly removed advice from its official cybersecurity guidelines that told high-risk individuals to enable Apple’s Advanced Data Protection (ADP), just weeks after demanding that Apple provide a backdoor that would allow the bypassing of this encryption. The removal, first

Husain Parvez First published on March 10, 2025

ExpressVPN has unveiled a major update for Linux users, introducing a full graphical user interface (GUI) for its VPN app. This update is designed to make the app more accessible for those who would rather not use the command line. Previously, ExpressVPN’s Linux app was command-line only,

Hendrik Human First published on March 10, 2025

A ransomware attack targeting newspaper giant Lee Enterprises has disrupted its ability to process payments for its hired freelancers and contractors, leaving many without compensation. The cyberattack, which began on February 3, 2025, has caused ongoing operational issues, affecting print

Husain Parvez First published on March 07, 2025