The listings featured on this site are from companies from which this site receives compensation and some are co-owned by our parent company. This influence: Rank and manner in which listings are presented.
Learn more
The How To Guide was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on The How To Guide are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Latest News

A 22-year-old British national has been arrested in Spain for allegedly hacking into dozens of US companies, according to a joint operation by Spanish authorities and the FBI. The suspect, who remains unnamed by authorities, was detained at Palma de Mallorca airport while attempting to board a

Husain Parvez First published on June 20, 2024

Pathology services provider Synnovis was targeted in a cyberattack on June 3, leading to widespread disruption across London hospitals. The ransomware attack, attributed to the Russian gang Qilin, has had a severe impact on medical services, forcing the cancellation of over 800 planned operations

Keira Waddell First published on June 18, 2024

A new phishing toolkit created by security researcher mr.d0x enables cybercriminals to exploit Progressive Web Apps (PWAs) to steal login credentials, posing a significant threat to internet users. According to a report from BleepingComputer, the toolkit allows for the creation of PWAs that

Husain Parvez First published on June 16, 2024

The Dutch Military Intelligence and Security Service (MIVD) has revealed that a Chinese cyber-espionage campaign exploited a critical vulnerability in FortiGate systems, affecting over 20,000 devices globally between 2022 and 2023. Earlier this year, the MIVD and the General Intelligence and

Hendrik Human First published on June 14, 2024

Pure Storage has confirmed a data breach involving unauthorized access to a Snowflake data analytics workspace, as reported on its official support page. This breach exposed telemetry information including company names and email addresses, LDAP usernames, and Purity software release version

Husain Parvez First published on June 12, 2024

Nord Security, the company behind NordVPN, has launched a new global eSIM service called Saily. The eSIM aims to meet the growing demands of global travelers and remote workers by providing a secure and convenient solution for internet connectivity while abroad. It’s designed to give users a

Keira Waddell First published on June 11, 2024

The vpnMentor research team is reporting about a recent incident involving the popular Stable Diffusion user interface, ComfyUI, that has sent shockwaves through the AI community, exposing the potential dangers lurking behind seemingly innocuous tools. While ComfyUI itself remains secure, a

vpnMentor Research Team First published on June 09, 2024

Google Maps will transition its Timeline feature from cloud-based to on-device storage by December 1, 2024. The feature, previously known as Location History, tracks routes and visits. It will now link this information to individual devices instead of cloud-based Google accounts. This change was

Hendrik Human First published on June 09, 2024

Researchers have discovered that malware can exploit Microsoft's new Windows Recall feature to steal sensitive user data. Windows Recall, which is part of Microsoft's new Copilot+ PCs, captures regular screenshots to help users retrieve previously seen content through natural language queries.

Husain Parvez First published on June 07, 2024