Proton

Últimos artículos

compromised passwords
en
  • Guías de privacidad
Compromised passwords are one of the biggest threats for most regular people. But how do passwords become compromised, and what can you do about it?
Is WeTransfer safe?
en
  • Guías de privacidad
Is WeTransfer secure? We review WeTransfer, determine whether it’s safe to use, and offer our recommendation for a better WeTransfer alternative.
what is a dictionary attack
en
  • Guías de privacidad
What is a dictionary attack? We go over how these types of cyberattack work and how you can protect your passwords against them.
en
  • Actualizaciones del producto
  • Proton Pass
Proton Pass Monitor is an advanced security feature that detects credential leaks and helps you defend your accounts.
en
  • Para empresas
Here are seven new business features for Proton Mail and Proton Calendar to help teams collaborate more efficiently.
what is a brute force attack
en
  • Guías de privacidad
What is a brute force attack? We go over brute force attack examples and ways to prevent this type of cyber attack.
en
  • Noticias sobre privacidad
Any privacy-focused company in the US faces numerous legal challenges, including multiple programs that allow for warrantless wiretaps.
en
  • Guías de privacidad
Here’s what to do if your data has been leaked — and how to protect yourself and your data with Dark Web Monitoring by Proton Mail.
en
  • Actualizaciones del producto
  • Proton Mail
With Dark Web Monitoring, you can have Proton watch for data leaks, ensuring you can change the passwords to accounts affected by a breach.
proton pass f-droid
en
  • Actualizaciones del producto
  • Proton Pass
Proton Pass now distributes its app on the open source app repository F-Droid, giving you more privacy and freedom.
chrome password manager
en
  • Guías de privacidad
If you take your online security seriously you’re probably using a password manager, but is your Chrome password manager actually secure?