all-in-one privacy solution":["Proton Unlimited — комплексное решение для защиты данных"],"Black Friday":["Черная пятница"],"No ads. Privacy by default.":["Без рекламы. Гарантия конфиденциальности"],"People before profits":["Люди важнее прибыли"],"Security through transparency":["Безопасность, основанная на прозрачности"],"The best Proton Mail ${ BLACK_FRIDAY } deals":["${ BLACK_FRIDAY }: лучшие предложения Proton Mail"],"The world’s only community- supported email service":["Единственный в мире сервис электронной почты с поддержкой сообщества"]},"specialoffer:limited":{"${ hours } hour":["${ hours } час","${ hours } часа","${ hours } часов","${ hours } часа"],"${ hoursLeft }, ${ minutesLeft } and ${ secondsLeft } left":["Осталось ${ hoursLeft }, ${ minutesLeft } и ${ secondsLeft }"],"${ minutes } minute":["${ minutes } минута","${ minutes } минуты","${ minutes } минут","${ minutes } минуты"],"${ seconds } second":["${ seconds } секунда","${ seconds } секунды","${ seconds } секунд","${ seconds } секунды"],"Limited time offer":["Ограниченное по времени предложение"]},"specialoffer:listitem":{"Create multiple addresses":["Создавайте несколько адресов"],"Hide-my-email aliases":["Создавайте алиасы hide-my-email"],"Quickly unsubscribe from newsletters":["С легкостью отменяйте подписку на рассылки"],"Use your own domain name":["Используйте собственное доменное имя"]},"specialoffer:logos":{"As featured in":["О нас в СМИ"]},"specialoffer:metadescription":{"Get an encrypted email that protects your privacy":["Электронная почта, защищающая вашу конфиденциальность"]},"specialoffer:metatitle":{"Proton Mail Black Friday Sale - Up to 40% off":["Черная пятница в Proton Mail: скидки до 40 %"]},"specialoffer:newmetadescription":{"Get up to 40% off Proton Mail subscriptions this Black Friday. Find great deals on our secure end-to-end encrypted email plans.":["Получите Proton Mail со скидкой до 40 %. Не пропустите выгодные предложения на планы безопасной электронной почты, зашифрованной сквозным шифрованием, в честь «черной пятницы»."]},"specialoffer:newmetatitle":{"Proton Mail Black Friday sale | Up to 40% off secure email":["«Черная пятница» в Proton Mail | Скидки до 40 %"]},"specialoffer:note":{"* Billed at ${ TOTAL_SUM } for the first year":["* ${ TOTAL_SUM } за первый год."],"*Billed at ${ TOTAL_SUM } for the first 2 years":["* ${ TOTAL_SUM } за первые два года."],"30-day money-back guarantee":["Гарантия возврата средств в течение 30 дней"],"Billed at ${ TOTAL_SUM } for the first 2 years":["${ TOTAL_SUM } за первые 2 года"],"Billed at ${ TOTAL_SUM } for the first year":["${ TOTAL_SUM } за первый год"],"You save ${ SAVE_SUM }":["Вы экономите ${ SAVE_SUM }."]},"specialoffer:off":{"${ DISCOUNT } off":["–${ DISCOUNT }"],"${ PERCENT_OFF } off":["–${ PERCENT_OFF }"]},"specialoffer:testimonial":{"I love my ProtonMail":["Обожаю ProtonMail!"],"My favorite email service":["Мой любимый сервис электронной почты"],"Thanks Proton for keeping us all safe in the complicated internet universe.":["Спасибо Proton за защиту в запутанном интернет-пространстве."],"You get what you pay for. In the case of big tech, if you pay nothing, you get used. I quit using Gmail and switched to @ProtonMail":["Полностью оправданное вложение денег. Бигтех-компании используют тебя, если ты им не платишь. Поэтому я перешла с Gmail на @ProtonMail."]},"specialoffer:time":{"Days":["дн."],"Hours":["ч."],"Min":["мин."]},"specialoffer:title":{"And much more":["И это еще не всё"],"Make your inbox yours":["Настройка на свой вкус"],"Safe from trackers":["Защита от трекеров"],"Stay organized":["Всё по полочкам"],"Black Friday email deals":["Безопасная почта для покупок в «черную пятницу»"],"Don’t just take our word for it":["Отзывы наших клиентов"],"Our story":["Наша история"],"Transfer your data from Google in one click":["Перенесите данные из Gmail в одно нажатие"]},"specialoffer:tooltip":{"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, connect up to 10 devices, access worldwide streaming services, malware and ad-blocker, and more.":["Сохраняйте конфиденциальность в Интернете и получайте доступ к заблокированному контенту. Включает ${ TOTAL_SERVERS } серверов более чем в ${ TOTAL_COUNTRIES } странах с возможностью подключения на 10 устройствах, доступ к стриминговым платформам со всего мира, блокировщик рекламы, функцию защиты от вредоносных программ и другие преимущества."],"Easily share your calendar with your family, friends or colleagues, and view external calendars.":["Предоставляйте доступ к календарю родственникам, друзьям и коллегам, а также просматривайте календари других сервисов"],"Includes support for 1 custom email domain, 10 email addresses, 10 hide-my-email aliases, calendar sharing, and more.":["Включает поддержку 1 пользовательского домена, 10 адресов электронной почты, 10 алиасов hide-my-email, совместный доступ к календарю и другие преимущества."],"Includes support for 3 custom email domains, 15 email addresses, unlimited hide-my-email aliases, calendar sharing, and more.":["Включает поддержку трех пользовательских доменов, 15 адресов электронной почты, неограниченного числа алиасов hide-my-email, совместный доступ к календарю и другие преимущества."],"Manage up to 25 calendars, mobile apps, secured with end-to-end encryption, 1-click calendar import from Google, and more.":["До 25 календарей, мобильные приложения, сквозное шифрование, удобный перенос данных из Google Календаря и другие преимущества"]},"Status Banner":{"At the moment we are experiencing issues with the Proton VPN service":["При использовании сервиса Proton VPN могут возникать проблемы"],"Learn more":["Подробнее"]},"Status banner":{"Learn more":["Подробнее"],"Please note that at the moment we are experiencing issues with the ${ issues[0] } service.":["Сейчас при использовании сервиса ${ issues[0] } могут возникать проблемы."],"We are experiencing issues with one or more services at the moment.":["При использовании одного или нескольких сервисов могут возникать проблемы."]},"suggestions":{"Suggestions":["Предложения"]},"Support":{"Sub category":["Подкатегория","Подкатегории","Подкатегорий","Подкатегорий"]},"Support article":{"${ readingTime } min":["${ readingTime } мин.","${ readingTime } мин.","${ readingTime } мин.","${ readingTime } мин."],"Category":["Категория","Категории","Категорий","Категорий"],"Didn’t find what you were looking for?":["Не нашли желаемый контент?"],"General contact":["Общие контакты"],"Get help":["Получить помощь"],"Legal contact":["Контакты юридического отдела"],"Media contact":["Контакты для прессы"],"Partnerships contact":["Контакты по вопросам партнерства"],"Reading":["Чтение"]},"Support categories":{"Browse Proton product support":["Смотреть ресурсы по поддержке продуктов Proton"]},"Support category":{"There is no article in this category yet.":["В этой категории еще нет статей."]},"Support troubleshooting":{"--- Select ---":["— Выбрать —"],"App version":["Версия приложения"],"Browser":["Браузер"],"Check if this helps":["Возможно, нужный ответ найдется здесь"],"Choose a category for your question":["Выберите категорию запроса"],"Choose a product":["Выберите продукт"],"Did this solve your issue ?":["Удалось ли нам решить вашу проблему?"],"Faster assistance is just a few clicks away — please make your selections":["Выберите подходящие варианты. Всего пара нажатий — и вы на шаг ближе к решению проблемы."],"No, contact support":["Нет, связаться со службой поддержки"],"Proton account":["Аккаунт Proton"],"Proton Bridge":["Proton Bridge"],"Proton Calendar":["Proton Calendar"],"Proton Drive":["Proton Drive"],"Proton for Business":["Proton for Business"],"Proton Mail":["Proton Mail"],"Proton Pass":["Proton Pass"],"Proton VPN":["Proton VPN"],"Thank you for your feedback":["Спасибо за отзыв!"],"Troubleshooting":["Устранение неполадок"],"What can we help with ?":["Чем мы можем вам помочь?"],"Yes":["Да"]},"support_modal_search_query":{"Search query":["Поисковый запрос"]},"support_search_button":{"Search":["Найти"]},"support_search_i_am_looking_for":{"I'm looking for":["Я ищу"]},"SupportForm":{"For a faster resolution, please report the issue from the Bridge app: Help > Report a problem.":["Чтобы быстро устранить проблему в приложении Bridge, выберите «Справка» > «Сообщить о проблеме»."],"Information":["Информация"]},"SupportForm:option":{"Account Security":["Безопасность аккаунта"],"Contacts":["Контакты"],"Custom email domain":["Пользовательский домен адреса электронной почты"],"Email delivery and Spam":["Доставка электронных писем и спам"],"Encryption":["Шифрование"],"Login and password":["Имя пользователя и пароль"],"Merge aliases and accounts":["Объединение псевдонимов и аккаунтов"],"Migrate to Proton":["Переход на Proton"],"Notifications":["Уведомления"],"Other":["Другое"],"Plans and billing":["Тарифы и оплата"],"Proton for Business":["Proton for Business"],"Sign up":["Регистрация"],"Storage":["Хранилище"],"Users, addresses, and identities":["Пользователи, адреса и личные данные"]},"SupportForm:optionIntro":{"Select a topic":["Выберите тему"]},"swiss_baseed_feature":{"Swiss based":["В Швейцарии"]},"Testimonial":{"Awards":["Награды"],"Customers":["Клиенты"],"Featured":["Что о нас говорят"],"Go to testimonial source":["Перейти к источнику отзыва"],"Reviews":["Отзывы"],"Videos":["видео."]},"Text":{"Find the plan that's right for you":["Найдите подходящий план"],"If you need help, check out our ${ supportLink }.":["Если вам нужна помощь, перейдите в ${ supportLink }."],"The page you’re looking for might have been removed, or it could be an\nold link.":["Возможно, страница удалена\nили у вас устаревшая ссылка."]},"Title":{"On this page":["На этой странице"],"Related articles":["Статьи по теме"],"Share ${ thisPage }":["Поделиться ${ thisPage }"],"Thank you!":["Спасибо!"],"this page":["этой страницей"]},"Tooltip":{"More information":["Подробнее"]},"tooltip_calendar":{"Create up to 20 custom & shareable encrypted calendars. On top of that, add up to 5 calendars from friends, family, colleagues, and organizations.":["Есть возможность создать до 20 зашифрованных пользовательских календарей и делиться ими с другими людьми, а также добавить до 5 календарей друзей, родственников, коллег и организаций."]},"tooltip_vpn":{"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, highest VPN speed, ${ TOTAL_VPN_CONNECTIONS } VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Получайте доступ к заблокированному контенту, просматривайте страницы анонимно и пользуйтесь стриминговыми сервисами со всего мира. Мы предлагаем ${ TOTAL_SERVERS } серверов более чем в ${ TOTAL_COUNTRIES } странах, высочайшую скорость VPN, ${ TOTAL_VPN_CONNECTIONS } VPN-подключений, защиту от вредоносных программ, блокировщик рекламы и многое другое."],"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, highest VPN speed, 10 VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Получайте доступ к заблокированному контенту, просматривайте страницы анонимно и пользуйтесь стриминговыми сервисами со всего мира. Мы предлагаем ${ TOTAL_SERVERS } серверов более чем в ${ TOTAL_COUNTRIES } странах, высочайшую скорость VPN, 10 VPN-подключений, защиту от вредоносных программ, блокировщик рекламы и многое другое."]},"version_history_label":{"Version history":["История версий"]},"version_history_tooltip":{"Store up to ${ versionHistoryNumber } versions of each file for up to ${ years } years":["Храните версии каждого файла (до ${ versionHistoryNumber }) не более нескольких лет (${ years })."]},"vpn_features_link":{"View VPN plans":["Посмотреть тарифы VPN"]},"vpn_features_useCase":{"Access blocked content and browse privately":["Доступ к заблокированному контенту и конфиденциальный просмотр веб-страниц"]}}},"unleashApi":"https://account.proton.me/api"};
// We need to import data (the framework context) from the server
// This Astro feature with define:vars works well but creates an inline script
// So we can't directly import the initFramework helper, we have to store the context
window.frameworkContext = frameworkContext;
})();
In response to the growing number of data breaches, Proton Mail offers a feature to paid subscribers called Dark Web Monitoring(new window). Our system checks if your credentials or other data have been leaked to illegal marketplaces and alerts you if so. Often a quick reaction to a data breach can protect your digital identity and prevent any losses.
The impact a breach can have on your life depends greatly on the type of information that was exposed and to whom.
There are two general classes of data breaches: those where the service that leaked your information is known, and those where it is not. Massive data breaches like those that have occurred for LinkedIn(new window), Facebook(new window), and X.com(new window) pose a different set of problems to those where a set of email/password combinations (combo lists) are sold or given away online by hackers.
This article includes general recommendations to mitigate the damage if your data leaks in a variety of scenarios. If you use Proton Mail’s Dark Web Monitoring service, we will give you actionable advice along with any breach notification you receive.
What is a data breach?
A data breach is when confidential, sensitive, or protected information is accessed or disclosed without authorization. This can involve the unintended release of personal data, such as social security numbers, credit card details, personal health information, or other personally identifiable information (PII). Data breaches can result from cybersecurity attacks, such as hacking or phishing, as well as from internal leaks or failures to secure data adequately.
Steps to take after a data breach
If the source of a data breach is known, you should immediately go to the service and check for any signs of unauthorized activity on your accounts, such as difficulty logging in, unexpected changes to security settings, receiving unfamiliar messages or notifications from your account, logins from unusual locations or at odd times, and unauthorized money transfers or purchases from your online accounts.
Some general steps to follow to secure a breached service include:
If you’re unable to log in to the account, contact the provider’s customer support to try to regain access.
If you have access, ensure your security settings, such as your recovery email, have not been changed. If they have, change them back.
If the breached service is an email provider, it’s important to review your email filtering and forwarding rules. Criminals often establish forwarding rules on compromised email accounts to receive copies of all incoming emails, enabling them to intercept 2FA codes or reset passwords, for instance.
If the service is a communication system or social network more generally, it can be a good idea to notify contacts that you have been breached and for them to watch out for suspicious messages and posts.
Dealing with the aftermath of a data leak
Even if you manage to secure a breached account, your email address, password, credit card number, physical address, and other information could have been leaked at the same time.
While all leaked information has some level of potential damage, some information is clearly more valuable than others, in particular:
Email addresses: Your email address is your online identity(new window), the passport all your accounts ask for when you log in. However, if your email address is all that’s exposed, you should be safe (hackers will still need to try to brute force your password to access your account).
You should:
Remain vigilant for phishing emails, especially those that may arrive sometime after the breach becomes public knowledge. Look out for senders impersonating services that write to you regarding “resetting passwords”, “claiming compensation”, or “missed deliveries’’. These and urgent requests to act immediately or within a limited timeframe are red flags.
Enabling 2FA is an excellent way to protect your account from attackers because even if they obtain your password they will still be unable to enter your account without an additional piece of information on your device.
Passwords: Exposed passwords, login credentials, or encryption keys can enable unauthorized entry into your accounts, potentially resulting in additional security breaches and data theft. While plaintext passwords are generally more severe in nature, some websites may store passwords using weak hashing methods like MD5, which canalso leave your passwords vulnerable to attack. Conversely, passwords leaked from websites where passwords were encrypted or hashed using stronger algorithms such as SHA256 or bcrypt will inherently offer greater resistance to attacks. Therefore, if plaintext or weakly hashed passwords have been exposed, you must change them immediately. We strongly recommend using a password manager, such as Proton Pass(new window), and 2FA(new window) wherever possible.
Credit card numbers: If your credit card number is leaked, you should put a hold on it immediately by calling the emergency number on the back of the card. It is also worth paying attention to your bank accounts and credit card statements and reporting any fraudulent transactions as soon as possible. If the source of the data breach is known, they will often provide subscriptions to credit monitoring software such as Experian so that you can mitigate financial risks.
Phone numbers: This can lead hackers to target you with phishing text messages, trying to catch you when you’re tired or not paying attention. You can protect yourself from spam calls in the UK with the Telephone Preference Service(new window) or in the US with the National Do Not Call Registry(new window). Other countries likely have similar services, which you can search for online. In addition, be wary of phishing attempts.
Social Security numbers: Social Security numbers are an important piece of information, particularly in the US, and can be used along with your name, address, and date of birth to set up credit cards or take out loans in your name. If you find out your Social Security number has been stolen, you should immediately report the theft to identitytheft.gov(new window), place a credit freeze, and add a fraud alert.
Though not exhaustive, this list covers the most commonly breached information. With almost 4,000 data breaches of 1.8 billion records happening in February 2024 alone, criminals are able to build up information about users across breaches to construct profiles containing not only your email addresses and passwords, but also your occupation, past employment, marital status, and more, making it easier to carry out more sophisticated phishing attacks. For example, this tool(new window) allows you to visualize your breach profile here.
Use better encryption to prevent data leaks
Many data breaches could be prevented if more online services used end-to-end encryption. At Proton, this form of encryption is at the heart of our security architecture. Whether it’s protecting your emails and attachments in Proton Mail or securing your files in Proton Drive, your data is encrypted on your device before uploading to our servers. That way, if hackers ever were to gain access to our systems, your information would remain encrypted because only you can unlock your data with your private key.
Secure, seamless communication is the foundation of every business. As more
organizations secure their data with Proton, we’ve dramatically expanded our
ecosystem with new products and services, from our password manager to Dark Web
Monitoring for cr
On the subject of cybersecurity, one term that often comes up is brute force
attack. A brute force attack is any attack that doesn’t rely on finesse, but
instead uses raw computing power to crack security or even the underlying
encryption.
In this a
Section 702 of the Foreign Intelligence Surveillance Act has become notorious as
the legal justification allowing federal agencies like the NSA, CIA, and FBI to
perform warrantless wiretaps, which sweep up the data of hundreds of thousands
of US citi
Your email address is your online identity, and you share it whenever you create
a new account for an online service. While this offers convenience, it also
leaves your identity exposed if hackers manage to breach the services you use.
Data breaches
Our mission at Proton is to help usher in an internet that protects your privacy
by default, secures your data, and gives you the freedom of choice.
Today we’re taking another step in this direction with the launch of our open
source password manage
You likely know you should store and manage your passwords safely. However, even
if you are using a password manager, there’s a chance the one you’re using isn’t
as secure as it could be. In this article we go over the threats some password
managers