We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Latest News

Meta, formerly known as Facebook, has agreed to a $1.4 billion settlement with Texas to resolve allegations that it collected and used biometric data from millions of Texas residents without their consent. The settlement, announced by Texas Attorney General Ken Paxton, is the largest ever for a

Hendrik Human Published on 3rd August 2024

Five apps on the Google Play Store have been spreading a sophisticated spyware known as Mandrake for years, according to a report from cybersecurity firm Kaspersky. The spyware, which has been active since at least 2020, re-emerged in 2022 after seemingly disappearing for a few years. It was hidden

Husain Parvez Published on 1st August 2024

A security flaw in WhatsApp for Windows allows Python and PHP scripts to execute without warning when opened by recipients. This vulnerability, affecting users with Python installed on their systems, could pose a risk to software developers, researchers, and power users. The flaw enables the

Keira Waddell Published on 30th July 2024

In the wake of escalating violent protests in Bangladesh, a massive surge in Virtual Private Network (VPN) usage has been witnessed as citizens strived to circumvent government-imposed internet restrictions. Earlier this month, two groups of students with opposing political views came into

vpnMentor Research Team Published on 28th July 2024

Minnesota-based spyware maker Spytech has fallen victim to a significant data breach, exposing the sensitive data of thousands of devices worldwide. According to TechCrunch, unknown hackers accessed Spytech’s servers and obtained a cache of files that included detailed activity logs from more than

Husain Parvez Published on 28th July 2024

Cybercriminals are exploiting the popularity of the Hamster Kombat mobile game by distributing fake clones to steal user information. The malicious apps are being spread primarily through Telegram and spoof websites, targeting players looking for the official game. The game, launched in March

Hendrik Human Published on 28th July 2024

Greece's Land Registry Department, also known as the Hellenic Cadastre, has faced over 400 cyberattacks within a week. These attacks, aimed at compromising the agency's IT infrastructure, resulted in a limited data breach. Hackers stole 1.2 GB of data from employee terminals — only a minuscule

Husain Parvez Published on 26th July 2024

A defective update from cybersecurity firm CrowdStrike led to a massive global IT outage on July 19, impacting millions of Windows systems and causing significant disruptions across various sectors. The incident has been described as one of the most widespread IT failures in recent years. It

Keira Waddell Published on 24th July 2024

Multiple critical vulnerabilities across Cisco products are leaving users vulnerable to attack, according to reports from several sources. Hackers are actively exploiting a critical vulnerability in Cisco's Security Email Gateway (SEG) devices to gain administrative access and add root users. The

Husain Parvez Published on 22nd July 2024