The listings featured on this site are from companies from which this site receives compensation and some are co-owned by our parent company. This influence: Rank and manner in which listings are presented.
Learn more
The How To Guide was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on The How To Guide are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Latest News: Cybersecurity

Cybersecurity firm CYFIRMA has uncovered a sophisticated spear messaging campaign targeting WhatsApp users in South Asia. The attack involves leading users to install a malicious Android app named "SafeChat". The app then stealthily steals sensitive user data, including call logs, texts, and GPS

Zane Kennedy First published on August 08, 2023

Guardio Labs security researchers uncovered a new, unpatched exploit in Salesforce email servers that resulted in an advanced email phishing campaign. The vulnerability allowed hackers to craft phishing emails under the company's email servers and domain, which were then used to target Facebook

Husain Parvez First published on August 07, 2023

In a wave of cyber attacks that have sent shockwaves through the European banking sector, users of multiple financial institutions have fallen victim to the insidious SpyNote Android spyware. The notorious malware, traditionally known for espionage and data collection, has recently been repurposed

Zane Kennedy First published on August 07, 2023

Google's fourth annual year-in-review of zero-day exploits emphasized the concerning issue of n-days on Android acting as effective 0-days for threat actors. Due to long delays in distributing and incorporating patches, threat actors are able to exploit n-day vulnerabilities that have yet to be

Husain Parvez First published on August 03, 2023

The cyber threat landscape has taken a sinister turn in recent weeks with the emergence of AI tools designed explicitly for malicious activities. According to recent findings by the Netenrich threat research team, a new generative AI-driven model known as “FraudGPT” has been making waves on the

Zane Kennedy First published on August 01, 2023

Cybersecurity researchers have discovered a new variant of the notorious AsyncRAT malware. Dubbed HotRat, the trojan is actively spreading through pirated versions of popular software, including video games, image and sound editing tools, and Microsoft Office. According to Avast security

Zane Kennedy First published on July 26, 2023

Chinese President Xi Jinping has instructed the construction of a “strong cyber security barrier” around China's internet infrastructure, reinforcing the country's infamous Great Firewall. His call, issued during a recent two-day cybersecurity meeting in Beijing, comes as part of an ongoing

Zane Kennedy First published on July 24, 2023

According to a recent post by Ram Gall, a threat analyst at the WordPress security firm Wordfence, an undisclosed group of hackers have initiated a campaign targeting a recently disclosed vulnerability in the WooCommerce Payments plugin. The campaign began on July 14th, with the intensity of the

Husain Parvez First published on July 20, 2023

Cybercriminals have found a potent weapon in the form of WormGPT, a generative AI tool designed explicitly for malicious activities. WormGPT has emerged as an alternative to the well-known AI model ChatGPT, empowering hackers to launch more sophisticated cyber attacks, particularly in Business

Zane Kennedy First published on July 20, 2023