all-in-one privacy solution":["Proton Unlimited ist eine All-in-One-Datenschutzlösung"],"Black Friday":["Black Friday"],"No ads. Privacy by default.":["Keine Werbung. Privatsphäre als Standard."],"People before profits":["Menschen sind uns wichtiger als Gewinne"],"Security through transparency":["Sicherheit durch Transparenz"],"The best Proton Mail ${ BLACK_FRIDAY } deals":["Die besten Proton Mail-Angebote zum ${ BLACK_FRIDAY }"],"The world’s only community- supported email service":["Der weltweit einzige von der Community unterstützte E-Mail-Dienst"]},"specialoffer:limited":{"${ hours } hour":["${ hours } Stunde","${ hours } Stunden"],"${ hoursLeft }, ${ minutesLeft } and ${ secondsLeft } left":["Nur noch ${ hoursLeft }, ${ minutesLeft } und ${ secondsLeft }"],"${ minutes } minute":["${ minutes } Minute","${ minutes } Minuten"],"${ seconds } second":["${ seconds } Sekunde","${ seconds } Sekunden"],"Limited time offer":["Zeitlich befristetes Angebot"]},"specialoffer:listitem":{"Create multiple addresses":["Erstelle mehrere Adressen"],"Hide-my-email aliases":["Hide-my-email-Aliase"],"Quickly unsubscribe from newsletters":["Newsletter schnell abbestellen"],"Use your own domain name":["Verwende deine eigene Domain"]},"specialoffer:logos":{"As featured in":["Vorgestellt in"]},"specialoffer:metadescription":{"Get an encrypted email that protects your privacy":["Nutze einen verschlüsselte E-Mail-Dienst, der deine Privatsphäre schützt"]},"specialoffer:metatitle":{"Proton Mail Black Friday Sale - Up to 40% off":["Proton Mail Black Friday-Angebot – Bis zu 40 % Rabatt"]},"specialoffer:newmetadescription":{"Get up to 40% off Proton Mail subscriptions this Black Friday. Find great deals on our secure end-to-end encrypted email plans.":["Erhalte an diesem Black Friday bis zu 40 % Rabatt auf Proton Mail-Abonnements. Mache tolle Schnäppchen bei unseren sicheren, Ende-zu-Ende-verschlüsselten E-Mail-Abonnements."]},"specialoffer:newmetatitle":{"Proton Mail Black Friday sale | Up to 40% off secure email":["Proton Mail-Black-Friday-Angebot | Bis zu 40 % Rabatt auf sichere E-Mails"]},"specialoffer:note":{"* Billed at ${ TOTAL_SUM } for the first year":["* Zum Preis von ${ TOTAL_SUM } im ersten Jahr"],"*Billed at ${ TOTAL_SUM } for the first 2 years":["*Zum Preis von ${ TOTAL_SUM } in den ersten zwei Jahren"],"30-day money-back guarantee":["30-tägige Geld-zurück-Garantie"],"Billed at ${ TOTAL_SUM } for the first 2 years":["Zum Preis von ${ TOTAL_SUM } in den ersten zwei Jahren"],"Billed at ${ TOTAL_SUM } for the first year":["Zum Preis von ${ TOTAL_SUM } im ersten Jahr"],"You save ${ SAVE_SUM }":["Du sparst ${ SAVE_SUM }"]},"specialoffer:off":{"${ DISCOUNT } off":["− ${ DISCOUNT }"],"${ PERCENT_OFF } off":["− ${ PERCENT_OFF }"]},"specialoffer:testimonial":{"I love my ProtonMail":["Ich liebe mein ProtonMail"],"My favorite email service":["Mein Lieblings-E-Mail-Dienst"],"Thanks Proton for keeping us all safe in the complicated internet universe.":["Danke Proton, dass du uns alle im komplizierten Internet-Universum beschützt."],"You get what you pay for. In the case of big tech, if you pay nothing, you get used. I quit using Gmail and switched to @ProtonMail":["Du bekommst, wofür du bezahlst. Wenn du nichts bezahlst, wirst du bei der Nutzung von Big Tech ausgenutzt. Ich habe Gmail aufgegeben und bin zu @ProtonMail gewechselt"]},"specialoffer:time":{"Days":["Tage"],"Hours":["Stunden"],"Min":["Min."]},"specialoffer:title":{"And much more":["Und vieles mehr"],"Make your inbox yours":["Übernimm volle Kontrolle über deinen Posteingang"],"Safe from trackers":["Sicher vor Trackern"],"Stay organized":["Sorge für Ordnung"],"Black Friday email deals":["E-Mail-Angebote zum Black Friday"],"Don’t just take our word for it":["Verlasse dich nicht nur auf unser Wort"],"Our story":["Unsere Geschichte"],"Transfer your data from Google in one click":["Übertrage deine Daten von Google mit einem Klick"]},"specialoffer:tooltip":{"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, connect up to 10 devices, access worldwide streaming services, malware and ad-blocker, and more.":["Greife auf blockierte Inhalte zu und surfe privat. Umfasst ${ TOTAL_SERVERS } Server in über ${ TOTAL_COUNTRIES } Ländern, die Verbindung \nvon bis zu 10 Geräten, weltweite Streaming-Dienste, Malware- und Werbeblocker und mehr."],"Easily share your calendar with your family, friends or colleagues, and view external calendars.":["Teile deinen Kalender ganz einfach mit Verwandten, Freunden oder Kollegen und rufe externe Kalender auf."],"Includes support for 1 custom email domain, 10 email addresses, 10 hide-my-email aliases, calendar sharing, and more.":["Beinhaltet Unterstützung für eine eigene E-Mail-Domain, 10 E-Mail-Adressen, 10 „hide-my-email“-Aliasse, Kalenderfreigabe und mehr."],"Includes support for 3 custom email domains, 15 email addresses, unlimited hide-my-email aliases, calendar sharing, and more.":["Beinhaltet Unterstützung für 3 benutzerdefinierte E-Mail-Domänen, 15 E-Mail-Adressen, unbegrenzte „hide-my-email“-Aliase, Kalenderfreigabe und mehr."],"Manage up to 25 calendars, mobile apps, secured with end-to-end encryption, 1-click calendar import from Google, and more.":["Verwalte bis zu 25 Kalender, Ende zu Ende verschlüsselte mobile Apps, 1-Klick-Kalenderimporte von Google und vieles mehr."]},"Status Banner":{"At the moment we are experiencing issues with the Proton VPN service":["Im Moment gibt es Probleme mit dem Proton VPN-Dienst"],"Learn more":["Mehr erfahren"]},"Status banner":{"Learn more":["Mehr erfahren"],"Please note that at the moment we are experiencing issues with the ${ issues[0] } service.":["Bitte beachte, dass wir im Moment Probleme mit dem Dienst ${ issues[0] } haben."],"We are experiencing issues with one or more services at the moment.":["Im Moment gibt es Probleme mit einem oder mehreren Diensten."]},"suggestions":{"Suggestions":["Vorschläge"]},"Support":{"Sub category":["Unterkategorie","Unterkategorien"]},"Support article":{"${ readingTime } min":["${ readingTime } Min.","${ readingTime } Min."],"Category":["Kategorie","Kategorien"],"Didn’t find what you were looking for?":["Hast du nicht gefunden, wonach du gesucht hast?"],"General contact":["Allgemeiner Kontakt"],"Get help":["Hilfe erhalten"],"Legal contact":["Kontakt für Rechtliches"],"Media contact":["Kontakt für Medien"],"Partnerships contact":["Kontakt für Partnerschaften"],"Reading":["Lesen"]},"Support categories":{"Browse Proton product support":["Produkt-Support von Proton durchsuchen"]},"Support category":{"There is no article in this category yet.":["In dieser Kategorie gibt es noch keinen Artikel."]},"Support troubleshooting":{"--- Select ---":["--- Auswählen ---"],"App version":["App-Version"],"Browser":["Browser"],"Check if this helps":["Schau, ob das hilft."],"Choose a category for your question":["Wähle eine Kategorie für deine Frage aus."],"Choose a product":["Produkt auswählen"],"Did this solve your issue ?":["Hat dies dein Problem gelöst?"],"Faster assistance is just a few clicks away — please make your selections":["Schnellere Hilfe ist nur ein paar Klicks entfernt. Bitte triff deine Auswahl"],"No, contact support":["Nein, Support kontaktieren"],"Proton account":["Proton-Konto"],"Proton Bridge":["Proton Bridge"],"Proton Calendar":["Proton Calendar"],"Proton Drive":["Proton Drive"],"Proton for Business":["Proton for Business"],"Proton Mail":["Proton Mail"],"Proton Pass":["Proton Pass"],"Proton VPN":["Proton VPN"],"Thank you for your feedback":["Danke für dein Feedback"],"Troubleshooting":["Fehlerbehebung"],"What can we help with ?":["Wie können wir dir helfen?"],"Yes":["Ja"]},"support_modal_search_query":{"Search query":["Anfrage suchen"]},"support_search_button":{"Search":["Suchen"]},"support_search_i_am_looking_for":{"I'm looking for":["Ich suche"]},"SupportForm":{"For a faster resolution, please report the issue from the Bridge app: Help > Report a problem.":["Damit das Problem schneller gelöst werden kann, melde es bitte über die Bridge-App: Help > Report a problem (Hilfe > Problem melden)."],"Information":["Informationen"]},"SupportForm:option":{"Account Security":["Kontosicherheit"],"Contacts":["Kontakte"],"Custom email domain":["Benutzerdefinierte E-Mail-Domain"],"Email delivery and Spam":["E-Mail-Zustellung und Spam"],"Encryption":["Verschlüsselung"],"Login and password":["Anmeldung und Passwort"],"Merge aliases and accounts":["Zusammenführung von Aliassen und Konten"],"Migrate to Proton":["Migration zu Proton"],"Notifications":["Benachrichtigungen"],"Other":["Sonstiges"],"Plans and billing":["Abonnements und Abrechnung"],"Proton for Business":["Proton for Business"],"Sign up":["Registrierung"],"Storage":["Speicher"],"Users, addresses, and identities":["Benutzer, Adressen und Identitäten"]},"SupportForm:optionIntro":{"Select a topic":["Thema auswählen"]},"swiss_baseed_feature":{"Swiss based":["In der Schweiz ansässig"]},"Testimonial":{"Awards":["Auszeichnungen"],"Customers":["Kunden"],"Featured":["Empfohlen"],"Go to testimonial source":["Zur Referenzquelle wechseln"],"Reviews":["Bewertungen"],"Videos":["Videos"]},"Text":{"Find the plan that's right for you":["Finde das passende Abonnement"],"If you need help, check out our ${ supportLink }.":["Hilfe erhältst du in unserem ${ supportLink }."],"The page you’re looking for might have been removed, or it could be an\nold link.":["Die von dir gesuchte Seite wurde möglicherweise entfernt, oder es könnte sich um einen alten Link handeln."]},"Title":{"On this page":["Auf dieser Seite"],"Related articles":["Verwandte Artikel"],"Share ${ thisPage }":["${ thisPage } teilen"],"Thank you!":["Vielen Dank!"],"this page":["diese Seite"]},"Tooltip":{"More information":["Weitere Informationen"]},"tooltip_calendar":{"Create up to 20 custom & shareable encrypted calendars. On top of that, add up to 5 calendars from friends, family, colleagues, and organizations.":["Erstelle bis zu 20 benutzerdefinierte und teilbare verschlüsselte Kalender. Darüber hinaus kannst du bis zu 5 Kalender von Freunden, Familie, Kollegen und Organisationen hinzufügen."]},"tooltip_vpn":{"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, highest VPN speed, ${ TOTAL_VPN_CONNECTIONS } VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Greife auf blockierte Inhalte zu und surfe privat. Enthält über ${ TOTAL_SERVERS } Server in mehr als ${ TOTAL_COUNTRIES } Ländern, höchste VPN-Geschwindigkeiten, ${ TOTAL_VPN_CONNECTIONS } VPN-Verbindungen, weltweite Streaming-Dienste, Malware- und Werbeblocker und mehr."],"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, highest VPN speed, 10 VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Greife auf blockierte Inhalte zu und surfe privat. Enthält über ${ TOTAL_SERVERS } Server in mehr als ${ TOTAL_COUNTRIES } Ländern, höchste VPN-Geschwindigkeiten, 10 VPN-Verbindungen, weltweite Streaming-Dienste, Malware- und Werbeblocker und mehr."]},"version_history_label":{"Version history":["Versionsverlauf"]},"version_history_tooltip":{"Store up to ${ versionHistoryNumber } versions of each file for up to ${ years } years":["Speichere bis zu ${ versionHistoryNumber } Versionen jeder Datei für einen Zeitraum von bis zu ${ years } Jahren"]},"vpn_features_link":{"View VPN plans":["VPN-Abonnements anzeigen"]},"vpn_features_useCase":{"Access blocked content and browse privately":["Greife auf blockierte Inhalte zu und surfe privat"]}}},"unleashApi":"https://account.proton.me/api"};
// We need to import data (the framework context) from the server
// This Astro feature with define:vars works well but creates an inline script
// So we can't directly import the initFramework helper, we have to store the context
window.frameworkContext = frameworkContext;
})();
The Microsoft Exchange hack might be one of the worst breaches of all time – We need a new approach to email security | Proton
Over the past two weeks, Microsoft clients using its Exchange servers, which includes tens of thousands of government agencies and private corporations around the world, have fallen victim to a series of hacks that have compromised their data. The breach started with a group of state-sponsored hackers attributed to China known as Hafnium, but more and more actors jumped into the fray after some of the exploits became public.
This is a serious breach that has exposed private user data as well as corporate and state secrets, materially damaging many small and medium-sized businesses and undermining trust in many government agencies. It is also a prime example of how the current approach to user privacy and security is failing.
A timeline of the Microsoft Exchange Server hack
March 2: Microsoft announced that hackers, dubbed Hafnium, were using multiple 0-day exploits (i.e., previously undiscovered vulnerabilities) to remotely access its Exchange servers and steal data from its corporate and government users.
Essentially, these hackers took three steps and exploited four separate vulnerabilities:
Hafnium gained access to Microsoft Exchange servers by taking advantage of stolen passwords and a previously undiscovered server-side request vulnerability to make itself appear to the Exchange server as someone who should have access.
The attackers then created a web shell, or a backdoor that allows browser-based access to the server to anyone that knows the web shell’s URL.
Hafnium then used the web shells to execute malicious code on the server remotely. Once in, the attackers could steal data, escalate privileges, or hold data ransom.
Microsoft responded by releasing emergency security patches for the affected systems (Exchange Server 2019-2013) and sent out a free patch to cover Exchange Server 2010, suggesting these vulnerabilities may have existed for the past 10 years.
Two weeks after Microsoft’s initial announcement, experts estimated there were still tens of thousands of Microsoft Exchange Servers that needed to be patched. Furthermore, state-sponsored hackers had already begun exploiting sensitive systems well before Microsoft became aware of the problem.
March 11: Microsoft detected that some of the servers compromised by Hafnium were being infected by a new type of ransomware known as DearCry.
Multiple attackers began exploiting the same vulnerabilities as Hafnium to gain access to Microsoft Exchange Servers. They committed various attacks, including DearCry, which makes copies of target files, encrypts those copies, and then deletes the originals.
March 11 to March 15: The daily attacks attempted on Microsoft Exchange Servers increased 10 times, from roughly 700 to over 7200(new window).
Experts estimate that almost 60,000 organizations(new window) (and maybe even more) could have been affected, ranging from small and medium-sized businesses up to the European Banking Authority. The majority of the DearCry attacks have focused on government and military organizations, followed by manufacturing and financial services, while the most attacked country has been the US, followed by Germany and the UK.
Security is hard
Almost every major technology company has had significant security incidents in the past. Microsoft itself also has a long history of security vulnerabilities in its products. The lesson to take away from these attacks’ success is not that these organizations are negligent or incompetent, but that security is hard.
In this incident, Microsoft was not attacked directly, but rather, hackers went after tens of thousands of organizations that run Microsoft Exchange software for their email. Regardless of whether it is Google, Microsoft, or their customers, cybersecurity is a form of asymmetric warfare.
Defenders must protect all possible entry points, while attackers only need to find a single weakness to get in.
A successful defense therefore needs to have multiple layers of security so that if one layer is breached, successive layers can keep attackers away from sensitive business data. When it comes to email, Proton Mail achieves this by utilizing zero-access encryption(new window).
Whenever possible, Proton Mail encrypts an organization’s email on the client side. Even emails received from outside of an organization are encrypted before they are saved. The encryption is done in a way that prevents even Proton Mail itself from having the means to independently decrypt user data. This adds an extra layer of security because breaching a Proton Mail server does not necessarily expose user emails. Unlike in the case of Microsoft Exchange (or Gmail or any other regular email service that does not utilize zero-access encryption), a hacker would still need to find a way to decrypt the messages.
You can’t expose data you don’t have access to
Proton Mail’s security model has prepared for a breach by investing in a technology that applies an extra layer of encryption to all messages on our servers.
Our zero-access encryption means we cannot access or read any user’s messages. Hackers cannot steal from us what we do not have access to. So even if Proton Mail ever were to be breached, a successful data exfiltration attack would be far harder to execute.
So why don’t all companies protect their users’ data with end-to-end or zero-access encryption? For one, strong encryption is difficult to do. The technology that underpins Proton Mail required years of research and work and was developed by scientists from CERN under the scrutiny of the open source community and independent security audits.
Then, there is also the issue of the business model a company uses. Corporations like Google make money by exploiting user data to sell ads. This is incompatible with technologies that prevent them from accessing user data, even if they are more secure.
This is not the first major security breach, nor will it be the last. And there is no reason to single out Microsoft. In fact, such an incident would have been exponentially worse if it had happened to Google or Facebook due to the significantly larger amounts of sensitive personal information stored by those companies. Protecting against risks like this is one of the reasons that millions of individuals and small and medium-sized businesses have switched to Proton Mail.
Encrypt all the data you can
Proton relies on user subscriptions for revenue, not leveraging our users’ data or selling access to advertisers. This makes us relatively unique among tech companies in that we do not need to access or abuse our users’ data for our business model to work. It’s not just better for privacy, it is better for security. We believe that this approach leads to a better internet that serves the interest of all people.
Our vision is to make privacy the default on the internet and beyond Proton Mail(new window) with strong encryption. We’re also extending this approach to new services as well, applying similar protection to your schedule and files with the recently released beta versions of Proton Calendar(new window) and Proton Drive(new window).
Sign up now and take a step toward an internet that puts protecting your data first.
WeTransfer is a popular service used by millions worldwide to send large files.
You may have wondered if it’s safe or whether you should use it to share
sensitive files. We answer these questions below and present a WeTransfer
alternative that may su
Dictionary attacks are a common method hackers use to try to crack passwords and
break into online accounts.
While these attacks may be effective against people with poor account security,
it’s extremely easy to protect yourself against them by usi
Datenpannen sind zunehmend alltäglich. Immer wenn du dich für einen
Online-Dienst anmeldest, gibst du persönliche Informationen preis, die für
Hacker wertvoll sind, wie E-Mail-Adressen, Passwörter, Telefonnummern und mehr.
Leider sichern viele Online
Sichere, nahtlose Kommunikation ist das Fundament jedes Unternehmens. Da immer
mehr Organisationen ihre Daten mit Proton sichern, haben wir unser Ökosystem mit
neuen Produkten und Dienstleistungen erheblich erweitert, vom Passwortmanager
bis zum Dark
Im Bereich der Cybersicherheit ist der Begriff Brute-Force-Attacke oft zu hören.
Eine Brute-Force-Attacke ist jeder Angriff, der nicht auf Finesse setzt, sondern
rohe Rechenkraft nutzt, um Sicherheitsmaßnahmen oder sogar die zugrundeliegende
Verschlü
Abschnitt 702 des Foreign Intelligence Surveillance Act hat sich als berüchtigte
rechtliche Rechtfertigung etabliert, die es Bundesbehörden wie der NSA, CIA und
FBI erlaubt, Überwachungen ohne richterlichen Beschluss durchzuführen, wodurch
die Daten