Latest articles
en
- Guías de privacidad
Compromised passwords are one of the biggest threats for most regular people.
But how do passwords become compromised, and what can you do about it?
en
- Guías de privacidad
Is WeTransfer secure? We review WeTransfer, determine whether it’s safe to use,
and offer our recommendation for a better WeTransfer alternative.
en
- Guías de privacidad
What is a dictionary attack? We go over how these types of cyberattack work and
how you can protect your passwords against them.
- Actualizaciones de producto
- Proton Pass
Proton Pass Monitor es una función de seguridad avanzada que detecta
filtraciones de credenciales y te ayuda a defender tus cuentas.
Aquí hay siete nuevas funciones empresariales para Proton Mail y Proton Calendar
para ayudar a los equipos a colaborar de manera más eficiente.
en
- Guías de privacidad
What is a brute force attack? We go over brute force attack examples and ways to
prevent this type of cyber attack.
en
- Noticias de privacidad
Any privacy-focused company in the US faces numerous legal challenges, including
multiple programs that allow for warrantless wiretaps.
en
- Guías de privacidad
Here’s what to do if you're affected by a data breach — protect yourself and
your data with Dark Web Monitoring and integrated 2FA by Proton.
en
- Actualizaciones de producto
- Proton Mail
With Dark Web Monitoring, you can have Proton watch for data leaks, ensuring you
can change the passwords to accounts affected by a breach.
en
- Actualizaciones de producto
- Proton Pass
Proton Pass now distributes its app on the open source app repository F-Droid,
giving you more privacy and freedom.
en
- Guías de privacidad
How secure is Google Password Manager? We investigate the security and risks of
using the default Chrome password manager to store passwords.