all-in-one privacy solution":["Proton Unlimited es solución de privacidad más completa"],"Black Friday":["Black Friday"],"No ads. Privacy by default.":["Sin publicidad. La privacidad por bandera."],"People before profits":["Nos importan las personas, no los beneficios"],"Security through transparency":["Seguridad con transparencia"],"The best Proton Mail ${ BLACK_FRIDAY } deals":["Las mejores ofertas del ${ BLACK_FRIDAY } de Proton Mail"],"The world’s only community- supported email service":["El único servicio de correo electrónico con apoyo de la comunidad"]},"specialoffer:limited":{"${ hours } hour":["${ hours } hora","${ hours } horas"],"${ hoursLeft }, ${ minutesLeft } and ${ secondsLeft } left":["Tiempo restante: ${ hoursLeft }, ${ minutesLeft } y ${ secondsLeft }"],"${ minutes } minute":["${ minutes } minuto","${ minutes } minutos"],"${ seconds } second":["${ seconds } segundo","${ seconds } segundos"],"Limited time offer":["Oferta por tiempo limitado"]},"specialoffer:listitem":{"Create multiple addresses":["Crea varias direcciones"],"Hide-my-email aliases":["Alias de hide-my-email"],"Quickly unsubscribe from newsletters":["Date de baja rápidamente de boletines"],"Use your own domain name":["Usa tu propio nombre de dominio"]},"specialoffer:logos":{"As featured in":["Hablan de nosotros"]},"specialoffer:metadescription":{"Get an encrypted email that protects your privacy":["Apuesta por un servicio de correo electrónico cifrado que protege tu privacidad"]},"specialoffer:metatitle":{"Proton Mail Black Friday Sale - Up to 40% off":["Rebajas de Black Friday de Proton: hasta un 40 % de descuento"]},"specialoffer:newmetadescription":{"Get up to 40% off Proton Mail subscriptions this Black Friday. Find great deals on our secure end-to-end encrypted email plans.":["Contrata Proton Mail con hasta un 40 % de descuento en las rebajas de Black Friday. Encontrarás nuestros planes de correo electrónico cifrado de extremo a extremo al mejor precio."]},"specialoffer:newmetatitle":{"Proton Mail Black Friday sale | Up to 40% off secure email":["Rebajas de Black Friday en Proton Mail | Correo electrónico seguro con hasta un 40 % de descuento"]},"specialoffer:note":{"* Billed at ${ TOTAL_SUM } for the first year":["* A un precio de ${ TOTAL_SUM } durante el primer año"],"*Billed at ${ TOTAL_SUM } for the first 2 years":["*A un precio de ${ TOTAL_SUM } durante los 2 primeros años"],"30-day money-back guarantee":["Garantía de devolución de 30 días"],"Billed at ${ TOTAL_SUM } for the first 2 years":["A un precio de ${ TOTAL_SUM } durante los 2 primeros años"],"Billed at ${ TOTAL_SUM } for the first year":["A un precio de ${ TOTAL_SUM } durante el primer año"],"You save ${ SAVE_SUM }":["Ahorras ${ SAVE_SUM }"]},"specialoffer:off":{"${ DISCOUNT } off":["−${ DISCOUNT }"],"${ PERCENT_OFF } off":["−${ PERCENT_OFF }"]},"specialoffer:testimonial":{"I love my ProtonMail":["Adoro ProtonMail"],"My favorite email service":["Mi servicio de correo electrónico favorito"],"Thanks Proton for keeping us all safe in the complicated internet universe.":["Gracias, Proton, por brindarnos protección en este mundo salvaje de Internet."],"You get what you pay for. In the case of big tech, if you pay nothing, you get used. I quit using Gmail and switched to @ProtonMail":["Dan justo lo que prometen. Si las grandes tecnológicas te ofrecen algo gratis, se aprovechan de ti, por eso dejé de usar Gmail y me pasé a @ProtonMail"]},"specialoffer:time":{"Days":["días"],"Hours":["horas"],"Min":["min"]},"specialoffer:title":{"And much more":["Y mucho más"],"Make your inbox yours":["Personaliza tu bandeja de entrada"],"Safe from trackers":["Evita los rastreadores"],"Stay organized":["Mantenlo todo en orden"],"Black Friday email deals":["Ofertas en correo electrónico del Black Friday"],"Don’t just take our word for it":["Lee testimonios de otras personas"],"Our story":["Nuestra historia"],"Transfer your data from Google in one click":["Transfiere tus datos de Google con un clic"]},"specialoffer:tooltip":{"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, connect up to 10 devices, access worldwide streaming services, malware and ad-blocker, and more.":["Accede a contenido bloqueado y navega con privacidad. Incluye ${ TOTAL_SERVERS } servidores en más de ${ TOTAL_COUNTRIES } países. Conecta hasta 10 dispositivos, acceder a servicios de streaming de todo el mundo, dispón de la protección de bloqueadores de malware y anuncios, etc."],"Easily share your calendar with your family, friends or colleagues, and view external calendars.":["Comparte tu calendario con familiares, amigos y compañeros fácilmente y consulta calendarios externos."],"Includes support for 1 custom email domain, 10 email addresses, 10 hide-my-email aliases, calendar sharing, and more.":["Incluye compatibilidad con 1 dominio de correo electrónico personalizado, 10 direcciones de correo electrónico, 10 alias de hide-my-email, posibilidad de compartir calendario, etc."],"Includes support for 3 custom email domains, 15 email addresses, unlimited hide-my-email aliases, calendar sharing, and more.":["Incluye compatibilidad con 3 dominios de correo electrónico personalizado, 15 direcciones de correo electrónico, alias ilimitados de hide-my-email, posibilidad de compartir calendario, etc."],"Manage up to 25 calendars, mobile apps, secured with end-to-end encryption, 1-click calendar import from Google, and more.":["Gestiona hasta 25 calendarios protegidos con cifrado de extremo a extremo y con opción, por ejemplo, de importar los de Google con un solo clic."]},"Status Banner":{"At the moment we are experiencing issues with the Proton VPN service":["Hay problemas con el servicio de Proton VPN en estos momentos"],"Learn more":["Más información"]},"Status banner":{"Learn more":["Más información"],"Please note that at the moment we are experiencing issues with the ${ issues[0] } service.":["Ten presente que, en estos momentos, el servicio de ${ issues[0] } está dando problemas de funcionamiento."],"We are experiencing issues with one or more services at the moment.":["Uno o varios servicios están dando problemas de funcionamiento en estos momentos."]},"suggestions":{"Suggestions":["Sugerencias"]},"Support":{"Sub category":["Subcategoría","Subcategorías"]},"Support article":{"${ readingTime } min":["${ readingTime } min","${ readingTime } min"],"Category":["Categoría","Categorías"],"Didn’t find what you were looking for?":["¿No has encontrado lo que buscabas?"],"General contact":["Contacto para consultas generales"],"Get help":["Obtener ayuda"],"Legal contact":["Contacto para cuestiones legales"],"Media contact":["Contacto para prensa y medios de comunicación"],"Partnerships contact":["Contacto para colaboraciones"],"Reading":["Lectura"]},"Support categories":{"Browse Proton product support":["Consulta la página de asistencia para productos de Proton"]},"Support category":{"There is no article in this category yet.":["No hay ningún artículo aún en esta categoría."]},"Support troubleshooting":{"--- Select ---":["--- Selecciona ---"],"App version":["Versión de la aplicación"],"Browser":["Navegador"],"Check if this helps":["Comprueba a ver si te sirve"],"Choose a category for your question":["Elige la categoría de tu consulta"],"Choose a product":["Elegir producto"],"Did this solve your issue ?":["¿Te ha resultado útil para resolver el problema?"],"Faster assistance is just a few clicks away — please make your selections":["Haz unos cuantos clics para obtener ayuda más rápidamente. Haz tu selección."],"No, contact support":["No, contactar con el equipo de asistencia"],"Proton account":["Cuenta de Proton"],"Proton Bridge":["Proton Bridge"],"Proton Calendar":["Proton Calendar"],"Proton Drive":["Proton Drive"],"Proton for Business":["Proton for Business"],"Proton Mail":["Proton Mail"],"Proton Pass":["Proton Pass"],"Proton VPN":["Proton VPN"],"Thank you for your feedback":["Gracias por tus comentarios"],"Troubleshooting":["Solución de problemas"],"What can we help with ?":["¿Cómo podemos ayudarte?"],"Yes":["Sí"]},"support_modal_search_query":{"Search query":["Consulta de búsqueda"]},"support_search_button":{"Search":["Buscar"]},"support_search_i_am_looking_for":{"I'm looking for":["Busco"]},"SupportForm":{"For a faster resolution, please report the issue from the Bridge app: Help > Report a problem.":["Para una resolución más rápida, informa del problema desde la aplicación Bridge: Ayuda > Notificar un problema."],"Information":["Información"]},"SupportForm:option":{"Account Security":["Seguridad de la cuenta"],"Contacts":["Contactos"],"Custom email domain":["Dominio de correo electrónico personalizado"],"Email delivery and Spam":["Envío de correos electrónico y spam"],"Encryption":["Cifrado"],"Login and password":["Inicio de sesión y contraseña"],"Merge aliases and accounts":["Fusionar seudónimos y cuentas"],"Migrate to Proton":["Migrar a Proton"],"Notifications":["Notificaciones"],"Other":["Otro"],"Plans and billing":["Planes y facturación"],"Proton for Business":["Proton for Business"],"Sign up":["Regístrate"],"Storage":["Almacenamiento"],"Users, addresses, and identities":["Usuarios, direcciones e identidades"]},"SupportForm:optionIntro":{"Select a topic":["Selecciona un tema"]},"swiss_baseed_feature":{"Swiss based":["Con sede en Suiza"]},"Testimonial":{"Awards":["Premios"],"Customers":["Clientes"],"Featured":["Destacado"],"Go to testimonial source":["Ir a la fuente del testimonio"],"Reviews":["Opiniones"],"Videos":["Vídeos"]},"Text":{"Find the plan that's right for you":["Encuentra el plan más adecuado para tus necesidades"],"If you need help, check out our ${ supportLink }.":["Si necesitas ayuda, consulta nuestra ${ supportLink }."],"The page you’re looking for might have been removed, or it could be an\nold link.":["Es posible que la página que buscas haya sido eliminada o que sea un\nenlace antiguo."]},"Title":{"On this page":["En esta página"],"Related articles":["Artículos relacionados"],"Share ${ thisPage }":["Compartir ${ thisPage }"],"Thank you!":["¡Gracias!"],"this page":["esta página"]},"Tooltip":{"More information":["Más información"]},"tooltip_calendar":{"Create up to 20 custom & shareable encrypted calendars. On top of that, add up to 5 calendars from friends, family, colleagues, and organizations.":["Crea hasta 20 calendarios personalizados y cifrados que puedes compartir con otras personas, y añade además hasta 5 calendarios de amigos, familiares, compañeros y organizaciones."]},"tooltip_vpn":{"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, highest VPN speed, ${ TOTAL_VPN_CONNECTIONS } VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Accede a contenido bloqueado y navega en privado. Tendrás a tu disposición más de ${ TOTAL_SERVERS } servidores en más de ${ TOTAL_COUNTRIES } países, VPN de máxima velocidad, ${ TOTAL_VPN_CONNECTIONS } conexiones VPN, servicios de streaming en todo el mundo, bloqueadores de malware y de anuncios, y mucho más."],"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, highest VPN speed, 10 VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Accede a contenido bloqueado y navega en privado. Tendrás a tu disposición más de ${ TOTAL_SERVERS } servidores en más de ${ TOTAL_COUNTRIES } países, VPN de máxima velocidad, 10 conexiones VPN, servicios de streaming en todo el mundo, bloqueadores de malware y de anuncios, y mucho más."]},"version_history_label":{"Version history":["Historial de versiones"]},"version_history_tooltip":{"Store up to ${ versionHistoryNumber } versions of each file for up to ${ years } years":["Almacena hasta ${ versionHistoryNumber } versiones de cada archivo durante ${ years } años como máximo"]},"vpn_features_link":{"View VPN plans":["Ver planes de VPN"]},"vpn_features_useCase":{"Access blocked content and browse privately":["Accede a contenido bloqueado y navega con privacidad"]}}},"unleashApi":"https://account.proton.me/api"};
// We need to import data (the framework context) from the server
// This Astro feature with define:vars works well but creates an inline script
// So we can't directly import the initFramework helper, we have to store the context
window.frameworkContext = frameworkContext;
})();
In response to the growing number of data breaches, Proton Mail offers a feature to paid subscribers called Dark Web Monitoring(new window). Our system checks if your credentials or other data have been leaked to illegal marketplaces and alerts you if so. Often a quick reaction to a data breach can protect your digital identity and prevent any losses.
The impact a breach can have on your life depends greatly on the type of information that was exposed and to whom.
There are two general classes of data breaches: those where the service that leaked your information is known, and those where it is not. Massive data breaches like those that have occurred for LinkedIn(new window), Facebook(new window), and X.com(new window) pose a different set of problems to those where a set of email/password combinations (combo lists) are sold or given away online by hackers.
This article includes general recommendations to mitigate the damage if your data leaks in a variety of scenarios. If you use Proton Mail’s Dark Web Monitoring service, we will give you actionable advice along with any breach notification you receive.
What is a data breach?
A data breach is when confidential, sensitive, or protected information is accessed or disclosed without authorization. This can involve the unintended release of personal data, such as social security numbers, credit card details, personal health information, or other personally identifiable information (PII). Data breaches can result from cybersecurity attacks, such as hacking or phishing, as well as from internal leaks or failures to secure data adequately.
Steps to take after a data breach
If the source of a data breach is known, you should immediately go to the service and check for any signs of unauthorized activity on your accounts, such as difficulty logging in, unexpected changes to security settings, receiving unfamiliar messages or notifications from your account, logins from unusual locations or at odd times, and unauthorized money transfers or purchases from your online accounts.
Some general steps to follow to secure a breached service include:
If you’re unable to log in to the account, contact the provider’s customer support to try to regain access.
If you have access, ensure your security settings, such as your recovery email, have not been changed. If they have, change them back.
If the breached service is an email provider, it’s important to review your email filtering and forwarding rules. Criminals often establish forwarding rules on compromised email accounts to receive copies of all incoming emails, enabling them to intercept 2FA codes or reset passwords, for instance.
If the service is a communication system or social network more generally, it can be a good idea to notify contacts that you have been breached and for them to watch out for suspicious messages and posts.
Dealing with the aftermath of a data leak
Even if you manage to secure a breached account, your email address, password, credit card number, physical address, and other information could have been leaked at the same time.
While all leaked information has some level of potential damage, some information is clearly more valuable than others, in particular:
Email addresses: Your email address is your online identity(new window), the passport all your accounts ask for when you log in. However, if your email address is all that’s exposed, you should be safe (hackers will still need to try to brute force your password to access your account).
You should:
Remain vigilant for phishing emails, especially those that may arrive sometime after the breach becomes public knowledge. Look out for senders impersonating services that write to you regarding “resetting passwords”, “claiming compensation”, or “missed deliveries’’. These and urgent requests to act immediately or within a limited timeframe are red flags.
Enabling 2FA is an excellent way to protect your account from attackers because even if they obtain your password they will still be unable to enter your account without an additional piece of information on your device.
Passwords: Exposed passwords, login credentials, or encryption keys can enable unauthorized entry into your accounts, potentially resulting in additional security breaches and data theft. While plaintext passwords are generally more severe in nature, some websites may store passwords using weak hashing methods like MD5, which canalso leave your passwords vulnerable to attack. Conversely, passwords leaked from websites where passwords were encrypted or hashed using stronger algorithms such as SHA256 or bcrypt will inherently offer greater resistance to attacks. Therefore, if plaintext or weakly hashed passwords have been exposed, you must change them immediately. We strongly recommend using a password manager, such as Proton Pass(new window), and 2FA(new window) wherever possible.
Credit card numbers: If your credit card number is leaked, you should put a hold on it immediately by calling the emergency number on the back of the card. It is also worth paying attention to your bank accounts and credit card statements and reporting any fraudulent transactions as soon as possible. If the source of the data breach is known, they will often provide subscriptions to credit monitoring software such as Experian so that you can mitigate financial risks.
Phone numbers: This can lead hackers to target you with phishing text messages, trying to catch you when you’re tired or not paying attention. You can protect yourself from spam calls in the UK with the Telephone Preference Service(new window) or in the US with the National Do Not Call Registry(new window). Other countries likely have similar services, which you can search for online. In addition, be wary of phishing attempts.
Social Security numbers: Social Security numbers are an important piece of information, particularly in the US, and can be used along with your name, address, and date of birth to set up credit cards or take out loans in your name. If you find out your Social Security number has been stolen, you should immediately report the theft to identitytheft.gov(new window), place a credit freeze, and add a fraud alert.
Though not exhaustive, this list covers the most commonly breached information. With almost 4,000 data breaches of 1.8 billion records happening in February 2024 alone, criminals are able to build up information about users across breaches to construct profiles containing not only your email addresses and passwords, but also your occupation, past employment, marital status, and more, making it easier to carry out more sophisticated phishing attacks. For example, this tool(new window) allows you to visualize your breach profile here.
Use better encryption to prevent data leaks
Many data breaches could be prevented if more online services used end-to-end encryption. At Proton, this form of encryption is at the heart of our security architecture. Whether it’s protecting your emails and attachments in Proton Mail or securing your files in Proton Drive, your data is encrypted on your device before uploading to our servers. That way, if hackers ever were to gain access to our systems, your information would remain encrypted because only you can unlock your data with your private key.
Secure, seamless communication is the foundation of every business. As more
organizations secure their data with Proton, we’ve dramatically expanded our
ecosystem with new products and services, from our password manager to Dark Web
Monitoring for cr
On the subject of cybersecurity, one term that often comes up is brute force
attack. A brute force attack is any attack that doesn’t rely on finesse, but
instead uses raw computing power to crack security or even the underlying
encryption.
In this a
Section 702 of the Foreign Intelligence Surveillance Act has become notorious as
the legal justification allowing federal agencies like the NSA, CIA, and FBI to
perform warrantless wiretaps, which sweep up the data of hundreds of thousands
of US citi
Your email address is your online identity, and you share it whenever you create
a new account for an online service. While this offers convenience, it also
leaves your identity exposed if hackers manage to breach the services you use.
Data breaches
Our mission at Proton is to help usher in an internet that protects your privacy
by default, secures your data, and gives you the freedom of choice.
Today we’re taking another step in this direction with the launch of our open
source password manage
You likely know you should store and manage your passwords safely. However, even
if you are using a password manager, there’s a chance the one you’re using isn’t
as secure as it could be. In this article we go over the threats some password
managers