Proton

Latest articles

The @ (at) sign and an open letter, representing what is an email address
en
  • Privatsphäre-Leitfäden
What is an email address, really? Discover how it works, what makes one valid, and simple tips to keep yours private.
Which mobile OS is more secure?
en
  • Privatsphäre-Leitfäden
We take an in-depth look at whether Android or iOS is more secure. It's a complex question with nuances on both sides.
A photo and a hand, representing ways to stop AI art theft
en
  • Privatsphäre-Nachrichten
Images captured by Pokémon Go players are now helping train AI systems that allow delivery robots to navigate cities with centimeter-level accuracy.
Reserve a private email address for your child with Born Private
en
  • Neuigkeiten von Proton
Give your child a safer start online. Reserve a private, secure, no-ads address with Proton Mail that stays sealed until your child is ready.
A computer with a family photo on the screen and a lock, representing the Proton Born Private US survey about parents worried about their children's online
en
  • Privatsphäre-Nachrichten
Proton survey shows most US parents worry about their kids' digital footprint, identity theft, and the long-term impact of growing up online.
The Instagram logo, a warning, and an open lock, representing an Instagram leak
en
  • Privatsphäre-Nachrichten
Instagram will drop end-to-end encrypted chats on May 8, 2026, reversing years of Meta’s push for stronger privacy. Here's what it means.
Illustration of a hand holding a phone and depicting a grocery cart and other objects to represent sectors in the breach report
en
  • Für Unternehmen
New incidents uncovered in the 2026 Data Breach Observatory show that small businesses were hit especially hard by cyberattacks.
an image of a purple cartoon envelope with a briefcase logo in the top right corner
en
  • Für Unternehmen
Find out what qualifies as a data breach in the UK, your legal obligations, and how to report it to the Information Commissioner’s Office.
an image showing a purple cartoon computer screen with a lock icon in the top left and an in tray in the bottom right
en
  • Für Unternehmen
Learn about ISO 27000: what they are, why they matter for security and compliance, and how to implement ISO-aligned credential controls.
an image of a purple cartoon computer screen with a warning icon in the center and a hand in a stop motion in the top right corner
en
  • Für Unternehmen
Find out about the data breach risks that UK businesses face and the best practices you need to implement to ensure business continuity.
A purple cartoon computer screen showing six app icons, two of which have warning icons on them
en
  • Für Unternehmen
Discover what worm viruses are, how they replicate, and how to protect your organization with a secure business password manager.