Proton

Qu’est-ce qu’une attaque par pulvérisation de mots de passe ?

Elena Constantinescu

Elena a commencé à couvrir la technologie en 2010 et a toujours été une fervente défenseuse de l'innovation et du respect de la vie privée numérique. Forte d'une expérience en test et en examen de logiciel, elle a commencé à écrire pour Proton afin de faire progresser la mission de l'entreprise vers la construction d'un internet privé et libre.

Articles similaires

an image of a purple cartoon computer screen with a warning icon in the center and a hand in a stop motion in the top right corner
en
Find out about the data breach risks that UK businesses face and the best practices you need to implement to ensure business continuity.
A purple cartoon computer screen showing six app icons, two of which have warning icons on them
en
Discover what worm viruses are, how they replicate, and how to protect your organization with a secure business password manager.
en
  • Actualités sur le respect de la vie privée
The App Store Accountability Act would require app stores to verify users’ ages and obtain parental consent. Learn how the bill could affect privacy and security.
an image showing two cartoon documents with a shield icon containing a lock icon in the bottom right corner
en
Backups aren’t sufficient to ensure business continuity. Find out what else you need to ensure operational resilience.
an image showing two purple cartoon computer screens with warning icons on them
en
Cybersecurity drives compliance and continuity for businesses of all sizes. Find out how credential governance helps prevent breaches.
an image showing eavesdropping between two purple cartoon mobile phones
en
  • Pour les entreprises
  • Guides sur le respect de la vie privée
Eavesdropping attacks can be levied at individuals and businesses, but how do they work? We explain how to protect against them