We earn commissions from the links, which influence where and how listings are displayed. Some providers are co-owned by our parent company.
Learn more
The How To Guide was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on The How To Guide are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Latest News: Cybersecurity

North Korean cybercriminal groups Kimsuky (APT43) and Andariel (APT45) exploited a VPN software update flaw in South Korea to install malware and steal trade secrets from construction and machinery companies. The malicious actors are believed to be operating in connection with North Korea’s

Anka Markovic Borak Published on August 13, 2024

A significant flaw in Microsoft Windows' update architecture has been discovered that allows attackers to downgrade fully patched systems, reintroducing old vulnerabilities. SafeBreach Labs researcher Alon Leviev unearthed this exploit. The vulnerability, showcased at the Black Hat 2024

Husain Parvez Published on August 11, 2024

A recent cyberattack on Mobile Guardian, a UK-based provider of mobile device management (MDM) software, has left thousands of students worldwide without access to their school work and files. The attack, which occurred on August 4th, resulted in unauthorized access to iOS and ChromeOS devices,

Husain Parvez Published on August 09, 2024

A ransomware attack on OneBlood, a prominent nonprofit blood donation organization, has disrupted blood supplies to over 300 hospitals across the southeastern United States. The cyberattack, which was first reported by CNN, has forced OneBlood to revert to manual processes, significantly slowing

Husain Parvez Published on August 05, 2024

Five apps on the Google Play Store have been spreading a sophisticated spyware known as Mandrake for years, according to a report from cybersecurity firm Kaspersky. The spyware, which has been active since at least 2020, re-emerged in 2022 after seemingly disappearing for a few years. It was hidden

Husain Parvez Published on August 01, 2024

A security flaw in WhatsApp for Windows allows Python and PHP scripts to execute without warning when opened by recipients. This vulnerability, affecting users with Python installed on their systems, could pose a risk to software developers, researchers, and power users. The flaw enables the

Keira Waddell Published on July 30, 2024

Cybercriminals are exploiting the popularity of the Hamster Kombat mobile game by distributing fake clones to steal user information. The malicious apps are being spread primarily through Telegram and spoof websites, targeting players looking for the official game. The game, launched in March

Hendrik Human Published on July 28, 2024

Multiple critical vulnerabilities across Cisco products are leaving users vulnerable to attack, according to reports from several sources. Hackers are actively exploiting a critical vulnerability in Cisco's Security Email Gateway (SEG) devices to gain administrative access and add root users. The

Husain Parvez Published on July 22, 2024

Prominent Indian cryptocurrency exchange WazirX suspended withdrawals on Thursday following a security breach that resulted in the loss of $230 million, approximately half its reserves. The breach, which WazirX described as a “force majeure event,” involved the compromise of one of its multisig

Hendrik Human Published on July 19, 2024

Check Point Researchers have discovered that a Windows MSHTML zero-day vulnerability has been exploited in malware attacks for over a year. The flaw, tracked as CVE-2024-38112, allows threat actors to bypass built-in security features and launch malicious scripts, which led to the installation of

Hendrik Human Published on July 14, 2024