Latest articles
- For business
Secure, seamless communication is the foundation of every business. As more
organizations secure their data with Proton, we’ve dramatically expanded our
ecosystem with new products and services, from our password manager to Dark Web
Monitoring for cr
- Privacy basics
On the subject of cybersecurity, one term that often comes up is brute force
attack. A brute force attack is any attack that doesn’t rely on finesse, but
instead uses raw computing power to crack security or even the underlying
encryption.
In this a
- Privacy deep dives
Section 702 of the Foreign Intelligence Surveillance Act has become notorious as
the legal justification allowing federal agencies like the NSA, CIA, and FBI to
perform warrantless wiretaps, which sweep up the data of hundreds of thousands
of US citi
- Privacy basics
In response to the growing number of data breaches, Proton Mail offers a feature
to paid subscribers called Dark Web Monitoring. Our system checks if your
credentials or other data have been leaked to illegal marketplaces and alerts
you if so. Often
Your email address is your online identity, and you share it whenever you create
a new account for an online service. While this offers convenience, it also
leaves your identity exposed if hackers manage to breach the services you use.
Data breaches
Our mission at Proton is to help usher in an internet that protects your privacy
by default, secures your data, and gives you the freedom of choice.
Today we’re taking another step in this direction with the launch of our open
source password manage
You likely know you should store and manage your passwords safely. However, even
if you are using a password manager, there’s a chance the one you’re using isn’t
as secure as it could be. In this article we go over the threats some password
managers
We all have sensitive personal information we’d all rather not share, whether
it’s documents, photographs, or even private video. This article covers how to
handle sensitive information or records, and what you can do to keep private
information priv
Social engineering is a common hacking tactic involving psychological
manipulation used in cybersecurity attacks to access or steal confidential
information.
They then use this information to commit fraud, gain unauthorized access to
systems, or, in
- Privacy basics
WhatsApp is the world’s leading messaging app, trusted by billions of people
around the globe to send and receive messages. However, is WhatsApp safe for
sending private photos? Or are there better ways to share photos online
privately? Let’s find ou
- Privacy basics
With the advent of passkeys, plenty of people are predicting the end of
passwords. Is the future passwordless, though? Or is there room for both types
of authentication to exist side-by-side?
At Proton, we are optimistic about passkeys and have int