We earn commissions from the links, which influence where and how listings are displayed. Some providers are co-owned by our parent company.
Learn more
The How To Guide was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of cybersecurity researchers, writers, and editors continues to help readers maintain their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on The How To Guide are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and detailed examination by the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Latest News

An internal memo revealed that the DHS uncovered a misconfiguration in one of its online platforms that left sensitive information exposed to “thousands” of unauthorized users. The platform operated by the DHS’s Office of Intelligence and Analysis (I&A) contained sensitive information shared

Hendrik Human Published on September 20, 2025

Researchers at cybersecurity firm Acronis have discovered an active FileFix campaign that exploits fake Facebook pages. The attackers create highly convincing pages and deploy advanced techniques to evade detection and reach victims worldwide. According to the report published by Acronis, the

Andrea Miliani Published on September 19, 2025

Geedge Networks, the organization behind China’s Great Firewall, has fallen victim to a massive data breach. The 500GB leak contained highly sensitive documents divulging technical implementation details of the censorship technology as well as its sale to authoritative countries like Myanmar,

Hendrik Human Published on September 19, 2025

Security researcher Eito Miyamura shared a post on the social media platform X last week demonstrating how it is possible to prompt-inject ChatGPT through Google Calendar invites. The cybersecurity expert exploited OpenAI’s new feature for Pro subscribers, which links ChatGPT to platforms such as

Andrea Miliani Published on September 18, 2025

TIME magazine named Tejasvi Manoj, a 17-year-old Indian American girl, “Kid of the Year 2025” for her work protecting seniors from cybercrime. In 2024, the teenager created a website, Shield Seniors, to educate older adults about online scams and has been raising awareness about malicious actors

Andrea Miliani Published on September 12, 2025

The streaming service Plex disclosed a “security incident” in which unnamed hackers stole potentially sensitive customer account information. Plex made the announcement on Tuesday, urging all customers to log out of all connected devices and reset their passwords as a precaution. In its

Hendrik Human Published on September 12, 2025

Popular VPN provider, Proton VPN, reported a sixfold increase in VPN app downloads following a social media ban in Nepal. The ban triggered a spate of nationwide protests, which turned violent and claimed the lives of at least 19 protesters in clashes with police. On August 25, Nepal’s cabinet

Hendrik Human Published on September 11, 2025

Cybercriminals are using a new, sophisticated tool called SpamGPT to launch large-scale email phishing campaigns. The AI-powered software has been promoted in the dark web as a “spam-as-a-service” platform that automates most of the tasks involved in an email phishing attack. According to

Andrea Miliani Published on September 11, 2025

The ransomware group LunaLock has allegedly hacked the website Artists&Clients, a platform that connects artists with clients, and encrypted all of its data. The hackers have requested a $50,000 ransom and threatened to use the stolen content to train Large Language Models (LLMs) if the

Andrea Miliani Published on September 05, 2025
12 3 4 5 ...64 Next