
NordVPN achieves excellent results in latest security and performance evaluation
The test was conducted by West Coast Labs in March 2025 and praised NordVPN's strong results, cementing its reputation as the best VPN on the market.
West Coast Labs carried out the evaluation under AMTSO (Anti-Malware Testing Standards Organization) guidelines and examined NordVPN's performance across key technical categories.
Speed, security, and reliability were the main focuses and NordVPN was put up against three randomly selected, undisclosed, competitors.
West Coast Labs conducted the test on NordVPN's Windows 10 and 11 VPN applications, using a high-speed 1 Gbps connection.
Main areas of focus included:
Split tunneling and the kill switch were confirmed to be working and secure. For the most secure VPNs, a functioning and reliable kill switch is a non-negotiable feature. It cuts your internet connection should your VPN fail, ensuring your data is never unprotected.
Auto-launch on boot and auto-connect were also examined and performed consistently and correctly.
The Ookla speed test tool was used to measure VPN speeds, latency, and connection time. The regions tested were the UK, France, Netherlands, Germany, East Asia, Australia (east coast), and the U.S. (west coast).
NordVPN is one of the fastest VPNs and the highest download speed recorded in this test was 920 Mbps – recorded on a U.S. server. This is just short of the 950+ Mbps we found in our own testing.
Compared to the undisclosed competitors, NordVPN delivered 15.2% faster downloads, 12.4% faster uploads, and 7.9% lower latency.
The average time for NordVPN to establish a secure, encrypted tunnel was 1.67 seconds.
West Coast Labs noted this was 36.1% faster than the industry average. This was measured from the moment a user initiated a connection to the point when traffic was securely routed through the VPN.
Eight separate leak scenarios were tested, including IP address, DNS, WebRTC, and IPv6 leak checks, as well as protection during server switching, Wi-Fi hotspot changes, and mobile data transitions.
Two advanced cases were also tested. This was a split-tunneling flaw and the TunnelVision attack – a known vulnerability that can be particularly challenging to defend against.
All scenarios were passed with good marks, demonstrating NordVPN's class-leading privacy and security.
Some websites may identify the fact you're using a VPN and a small number might even block you from accessing the site.
West Coast Labs tried to access 100 of the most visited websites, both before and after connecting to NordVPN. There was a 100% success rate, with all sites remaining accessible. However, some CAPTCHA challenges were experienced.
Finally, NordVPN had a minimal impact on system performance. Compared to no VPN connection, memory usage increased by 1.1% and processor usage increased by 3.8%.
If you want to see more detail, you can read the West Coast Labs report in full.
"Independent testing is one of the most honest measures of our work," said Marijus Briedis, CTO at NordVPN.
"This evaluation confirms that NordVPN delivers strong security while maintaining high levels of speed and usability – a result we're proud to stand behind."
"We design it to work quietly in the background – quick to connect, light on system resources, and ready to protect across a range of scenarios, including those that test for serious vulnerabilities like TunnelVision. It's good to see those goals confirmed."
NordVPN regularly undergoes independent audits, verifying its commitment to privacy and security.
At the end of 2024, it had its no-logs policy audited for a fifth time, as well as its security credentials – both audits yielded positive results.
We test and review VPN services in the context of legal recreational uses. For example: 1. Accessing a service from another country (subject to the terms and conditions of that service). 2. Protecting your online security and strengthening your online privacy when abroad. We do not support or condone the illegal or malicious use of VPN services. Consuming pirated content that is paid-for is neither endorsed nor approved by Future Publishing.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


TechCrunch
2 hours ago
- TechCrunch
SonicWall urges customers to disable SSLVPN amid reports of ransomware attacks
Enterprise security company SonicWall is urging its customers to disable a core feature of its most recent line-up of firewall devices after security researchers reported an uptick in ransomware incidents targeting SonicWall customers. In a statement this week, SonicWall said it had observed a 'notable increase' of security incidents targeting its Generation 7 firewalls where customers have its VPN enabled. The company said it is 'actively investigating these incidents to determine whether they are connected to a previously disclosed vulnerability or if a new vulnerability may be responsible.' The company's alert comes as security researchers say they have identified hackers targeting SonicWall devices to gain initial access to a victim's network. Hackers are increasingly targeting enterprise products, like firewalls and VPNs, which work as digital gatekeepers, allowing legitimate employees access to the company's network. But security flaws in these products can allow malicious hackers in, enabling attackers to launch data-stealing or destructive attacks. Security firm Arctic Wolf said it has seen intrusions targeting SonicWall customers as far back as mid-July. The company said 'available evidence points to the existence of a zero-day vulnerability,' referring to a security bug that was discovered and exploited before the vendor could patch the issue. The researchers said they witnessed a short gap between the exploitation of the SonicWall firewall and the subsequent deployment of file-encrypting malware, or ransomware. Huntress Labs, another cybersecurity firm, said it is 'likely' that a zero-day bug in SonicWall firewalls is to blame for the attacks, and warned that the hackers exploiting the bug have been seen gaining access to a company's domain controllers, which manages the devices and users on that network. In its blog, Huntress said it believes the Akira ransomware gang is behind some of the attacks targeting SonicWall customers. Akira has been known to target enterprise products, like Fortinet firewalls, to break into large networks. 'This is a critical, ongoing threat,' wrote Huntress.


Tom's Guide
6 hours ago
- Tom's Guide
Still stuck on Windows 10? Microsoft reveals the reasons why you can't upgrade to Windows 11, and how to fix them
One of the biggest frustrations in the world of computing at the moment is upgrading from Windows 10 to Windows 11. Microsoft started with some pretty high bars for Windows 10 users to clear to be able to upgrade — like higher minimum system requirements and a TPM 2.0 chip. But the Redmond crew has been starting to lend more of a helping hand, especially with a new pop-up notification and this support article. This details what key things may be driving compatibility issues with a newer version of windows. If there are compatibility issues with your hardware, you'll typically get pinged with a 'What needs your attention' banner message. In it, Microsoft points to four things: For Driver and Windows feature, it's going to be just a case of ensuring your PC is connected to the internet and either: Looking at hardware, it's worth noting that in spite of these issues, it's technically possible to install Windows 11 on a system that isn't compatible on paper. Microsoft does say 'you should be comfortable assuming the risk of running into compatibility issues." Here's our full guide on how to upgrade to Windows 11. And finally, apps. This one, you've got three choices depending on what is possible: Get instant access to breaking news, the hottest reviews, great deals and helpful tips. A key reason why this has been a frustration is the end of life messaging hasn't necessarily come with clear steps to fix it. Microsoft was more than happy to tell you what won't work, but didn't really highlight proactive steps to be upgrade-ready. With this, it's great to see support on how to get around these holds on people being unable to upgrade to Windows 11, and I can see it helping a lot of people in getting to the latest version. Follow Tom's Guide on Google News to get our up-to-date news, how-tos, and reviews in your feeds. Make sure to click the Follow button.


Forbes
10 hours ago
- Forbes
Microsoft's Update Mistake—45% Of All Windows Users Now At Risk
The world is no less confusing for Microsoft's 700 million Windows 10 users than it was before its emergency u-turn. Yes, support has been extended for a year, pushing the cliff edge from October 2025 to October 2026, but there are plenty of catches. Some of these relate to updates for software running on Windows 10 after this year's October 14 deadline. And some relate to the costs in snagging the 'free' 12-month security update extension. But the main catch is the heightened security risks. Microsoft has emphasized the risks in remaining on Windows 10 with the same vigor as the benefits in moving to Windows 11. As all users must know by now, the reason there's such a furor about this upgrade is the TPM security hurdle PCs must meet to be eligible. This rules out hundreds of millions of PCs, despite occasional suggestions that some of those machines may be upgraded anyway. For most users the upgrade still means buying a new PC, ideally — Microsoft says — a new Copilot+ PC steeped in AI. As I have pointed out, Microsoft u-turned on Windows 10's hard red line at just the wrong time, just as Windows 11 caught and has since overtaken Windows 10 for the first time. It would — in my view — have been better to limit its free extension to just the users that can't update current PCs and need more time to buy something new. The risk is that the accelerating progress slows or reverses, simply delaying rather than resolving the problem. And the early signs suggest this may indeed be the case. The early data from Statcounter this month suggests Windows 11 is already seeing some of its gains against Windows 10 start to reverse. While this data is just illustrative, it makes sense given the removal of October's red line. This means 45% of all Windows users are now on the soon-to-be-retired version of the OS and at risk. Whichever of Microsoft's options you pick — including the free Windows 11 upgrade if available, don't run out of time. At a minimum take the 12-month security extension. Make sure that come October 14 you're not off support.