Proton

Sind Sicherheitsfragen schrecklich für die Kontosicherheit?

The cover image for a Proton blog about whether security questions are safe. The image shows two password fields, one with a shield containing a question mark and one with a triangle containing an exclamation mark
Edward Komenda

Ed ist Autor und Journalist. In den letzten 10 Jahren erschienen seine Arbeiten in großen Zeitungen und Magazinen in den USA und auf der ganzen Welt. Er hat über alles geschrieben, von Wirtschaft und Technologie bis hin zu Politik, Regierung und Kultur. Ed kam 2023 zu Proton, um Online-Privatsphäre als grundlegendes Menschenrecht zu schützen.

Verwandte Artikel

The Instagram logo, a warning, and an open lock, representing an Instagram leak
en
  • Privatsphäre-Nachrichten
Instagram will drop end-to-end encrypted chats on May 8, 2026, reversing years of Meta’s push for stronger privacy. Here's what it means.
Illustration of a hand holding a phone and depicting a grocery cart and other objects to represent sectors in the breach report
en
New incidents uncovered in the 2026 Data Breach Observatory show that small businesses were hit especially hard by cyberattacks.
an image of a purple cartoon envelope with a briefcase logo in the top right corner
en
Find out what qualifies as a data breach in the UK, your legal obligations, and how to report it to the Information Commissioner’s Office.
an image showing a purple cartoon computer screen with a lock icon in the top left and an in tray in the bottom right
en
Learn about ISO 27000: what they are, why they matter for security and compliance, and how to implement ISO-aligned credential controls.
an image of a purple cartoon computer screen with a warning icon in the center and a hand in a stop motion in the top right corner
en
Find out about the data breach risks that UK businesses face and the best practices you need to implement to ensure business continuity.
A purple cartoon computer screen showing six app icons, two of which have warning icons on them
en
Discover what worm viruses are, how they replicate, and how to protect your organization with a secure business password manager.