Latest articles
en
- Novinky Proton
The results of the 2024 Proton community survey are in! Now you can learn more
about what most of the community wants.
en
- Průvodci ochranou soukromí
Learn what a rainbow table attack is and how to stop this kind of data breach,
safeguarding your confidential information.
en
- Průvodci ochranou soukromí
Discover the types of identity theft that can damage your financial health and
credit score. Get simple tips to protect your data from thieves.
en
Are you using Google Workspace to operate your healthcare business? If you’re
concerned about HIPAA compliance, you may want to seek an alternative.
en
- Průvodci ochranou soukromí
What do you call an email conversation? Here's the difference between an email
thread, email string, an email trail, and more — and when you should use which.
en
- Průvodci ochranou soukromí
Identity theft affects millions of people worldwide, causing billions in damage.
Here are 5 proven methods for identity theft prevention.
- Průvodci ochranou soukromí
Google je jednou z největších překážek soukromí. Tento článek prozkoumá, jak a
proč se deGooglovat, abyste získali zpět a chránili své digitální soukromí.
en
- Průvodci ochranou soukromí
What should you do if someone steals your Social Security number? We explain
what you can do if your SSN is stolen and how to protect it.
en
- Průvodci ochranou soukromí
Compromised passwords are one of the biggest threats for most regular people.
But how do passwords become compromised, and what can you do about it?
en
- Průvodci ochranou soukromí
Is WeTransfer secure? We review WeTransfer, determine whether it’s safe to use,
and offer our recommendation for a better WeTransfer alternative.
en
- Průvodci ochranou soukromí
What is a dictionary attack? We go over how these types of cyberattack work and
how you can protect your passwords against them.