We earn commissions from the links, which influence where and how listings are displayed. Some providers are co-owned by our parent company.
Learn more
The How To Guide was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on The How To Guide are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Latest News

A novel attack technique known as SMTP Smuggling has been discovered, allowing hackers to bypass traditional email authentication protocols and send spoofed emails from trusted domains. This technique, uncovered by Timo Longin, a senior security consultant at SEC Consult, exploits vulnerabilities

Husain Parvez First published on December 21, 2023

MongoDB, the US-based company behind the popular open-source NoSQL database management system, has reported a cyberattack that has exposed customer account metadata and contact information. The breach was detected on December 13, 2023, prompting MongoDB to initiate an immediate investigation into

Keira Waddell First published on December 20, 2023

The OLVX Marketplace, identified by ZeroFox researchers, is a new and growing underground market that offers a wide array of tools for helping threat actors succeed in online fraud and cyberattacks. This rise in cybercrime activity is especially concerning as it coincides with the busiest shopping

Zane Kennedy First published on December 20, 2023

Leading cybersecurity research firm ESET has recently discovered 18 Android loan apps which are scamming users, now known as the "SpyLoan" scandal. These apps, which have been downloaded over 12 million times from Google Play, have been deceiving users with the promise of quick and easy financial

Zane Kennedy First published on December 15, 2023

Norton Healthcare, a Kentucky-based nonprofit healthcare system, confirmed a ransomware attack in May compromised the personal data of approximately 2.5 million patients and employees. The attack, which was first detected on May 9, allowed hackers to access certain network storage devices between

Husain Parvez First published on December 13, 2023

A security vulnerability named “AutoSpill” poses a threat to Android users who rely on password managers. It has been identified by researchers at the International Institute of Information Technology (IIIT) in Hyderabad, India. The vulnerability, presented at the Black Hat Europe security

Keira Waddell First published on December 12, 2023

In a landmark privacy move, Meta has announced the rollout of default end-to-end encryption for personal chats and calls on Messenger, marking a significant stride in digital privacy. As articulated by Loredana Crisan, Head of Messenger, this update ushers in a new era where user communications are

Zane Kennedy First published on December 10, 2023

In an alarming revelation for iPhone users, Jamf Threat Labs has uncovered a sophisticated cybersecurity threat termed "Fake Lockdown Mode." This form of post-exploitation tampering is designed to deceive users into believing their Apple iPhone is secure in Lockdown Mode when, in reality, it is

Zane Kennedy First published on December 08, 2023