Latest articles
en
- Guías de privacidad
What is a brute force attack? We go over brute force attack examples and ways to
prevent this type of cyber attack.
en
- Noticias de privacidad
Any privacy-focused company in the US faces numerous legal challenges, including
multiple programs that allow for warrantless wiretaps.
en
- Guías de privacidad
Here’s what to do if you're affected by a data breach — protect yourself and
your data with Dark Web Monitoring and integrated 2FA by Proton.
en
- Actualizaciones de productos
- Proton Mail
With Dark Web Monitoring, you can have Proton watch for data leaks, ensuring you
can change the passwords to accounts affected by a breach.
en
- Actualizaciones de productos
- Proton Pass
Proton Pass now distributes its app on the open source app repository F-Droid,
giving you more privacy and freedom.
en
- Guías de privacidad
How secure is Google Password Manager? We investigate the security and risks of
using the default Chrome password manager to store passwords.
en
- Para empresas
- Guías de privacidad
Learn which data is confidential and how to ensure sensitive data protection
using a privacy-first tool with end-to-end encryption.
en
- Guías de privacidad
Here's what you need to know about social engineering attacks — including
examples of social engineering and how to keep your business safe.
en
- Guías de privacidad
Is WhatsApp safe for sending private photos? We go over everything you need to
know before using this popular messaging app.
en
- Guías de privacidad
Is passwordless authentication the way of the future? Here’s why Proton Pass is
not preparing to abandon passwords just yet.
- Novedades de Proton
Proton y la aplicación de toma de notas cifrada de extremo a extremo Standard
Notes unen fuerzas. Hemos sido admiradores durante mucho tiempo y estamos
emocionados de dar la bienvenida a Mo y su equipo.