Artigos mais recentes
- Guias de privacidade
In this article, we tell you how to create a strong password and the best way to
keep it safe.
This guide can help your small business take control of network security and
secure your business’s data and future.
- Atualizações de produtos
- Proton Mail
In the past week, the Russian government has been attempting to prevent Russian
citizens from sending messages to Proton Mail. We believe this block is
unjustified, and we will restore full services to users in Russia.
- Notícias da Proton
We are happy to announce that the European Commission has awarded €2 million to
Proton AG, the parent company of Proton Mail and Proton VPN, to develop a suite
of encrypted services.
- For business
Cybercriminals don't differentiate between small and large. Last year, 58% of
victims were small business. Here's how to avoid becoming the next victim.
Managers can improve their small business’s cybersecurity by creating a
security-conscious culture in the workplace. Learn more in this guide.
- Notícias da Proton
Earlier today claims appeared that Proton Mail is compromised because of an
alleged connection between our SSL certificates and DarkMatter, a shadowy
cybersecurity company. These allegations are false, as we will explain.
- Guias de privacidade
A strong password doesn’t have to be 30 characters long. But if you’re using an
eight-character password, you have a good chance of being hacked.
- For business
Every small business faces unique difficulties in securing its data. This guide
will help you determine your threat model and take the steps necessary to
protect your company.
Terrorist content has no place on any online platform, but we must also preserve
our fundamental human rights even as we prevent terrorists and other criminals
from abusing the Internet.
- Atualizações de produtos
- Proton Mail
Recently, a self-published paper that was not peer reviewed claimed weaknesses
in Proton Mail's cryptographic architecture. The claims made in this paper are
not inherent to Proton Mail's architecture. We do not believe the paper’s
arguments constitu