The top five vulnerabilities exploited by attackers last were found in security gear from Citrix, Cisco and Fortinet, the Five Eyes’ cyber agencies found.
VPN novices will find that they can just download the software, choose their server location and connect — it’s as simple as that. But more advanced users will be able to choose from features ...
(See “Can a VPN really hide all of your torrent activity?” to learn more.) Why you should trust me: Here at PCWorld we’ve been testing computer hardware, software, and services since the 1980s.