Proton

Proton blog

Reserve a private email address for your child with Born Private

Latest articles

See all articles
An envelope, a password field, and a pencil, representing how to change email password
Find out how to change your email password and improve email security on Gmail, Outlook, and Proton Mail, including on iPhone and Android.
Illustration of a warning sign with icons of concealed passwords of various lengths
Even with strong passwords and MFA, breaches still happen. See the hidden gaps, common risks, and how to close them effectively.
Illustration representing a person's identity being stolen through a phishing attack
Learn how to build phishing awareness training that helps employees recognize attacks, report them quickly, and reduce risk in your organization.
Image of a calendar with product milestones indicated under the Proton ecosystem logo
  • Lumo AI
  • Product updates
  • Proton Calendar
  • Proton Drive
  • Proton Mail
  • Proton Pass
Find out updates and new features you can expect for the Proton ecosystem in the Spring and Summer of 2026.
a purple animated computer screen with three tick icons overlaying a spreadsheet, text says 'proton pass' at the top
  • Product updates
  • Proton Pass
Take a look at the new features we're planning for Proton Pass in spring and summer, and catch up on our latest releases.
a screen showing the new groups feature for proton pass: a group titled 'design team' with four members
You can now organize your team members and simplify team password sharing with groups in Proton Pass. Find out how to create a group
Independent auditors confirmed Proton Pass is exceptionally secure. See why transparency is our strongest security feature.
Andy Yen, Proton founder and CEO, speaking at Security in the Digital Century, part of Semafor World Economy 2026, in Washington, D.C.
Powerful forces are exploiting parents’ fears to strengthen their toxic business models. Here’s how we stop them.
A visual representation of the UI for Proton Meet end-to-end encrypted video conferencing service
  • For business
  • Proton Meet
  • Proton news
Protect the conversations that matter with a secure, end-to-end encrypted video conferencing from Proton.
The Microsoft Edge logo, keys, and a password field, representing how Microsoft Edge keeps all saved passwords unencrypted
  • For business
  • Privacy news
Microsoft Edge keeps all saved passwords in plaintext memory instead of encrypting them. Here’s what you risk and what you should do instead.
A computer screen with the Meta logo in the middle, and an eye symbol, representing how Meta is using employee behavioral data for AI training
  • For business
  • Privacy news
Meta is tracking employees and using behavioral data to train AI while planning layoffs. Are workers helping build their own replacements?
a computer screen with a crossed out american flag in the center with the flags for denmark, norway, sweden and finland in the top right of the screen
We asked 4,000 people in Nordic countries what they think of US tech. Turns out they're not fans.
An envelope, a password field, and a pencil, representing how to change email password
Find out how to change your email password and improve email security on Gmail, Outlook, and Proton Mail, including on iPhone and Android.
A computer screen, an ID, and a lock, representing data anonymization
Anonymized data can still be traced back to you. Here's how companies use it, and how you can protect your privacy.
A phone, a settings symbol, and a progress bar, representing how to clear iPhone cache
Cache accumulates and takes up precious storage space. Here’s how to clear cache on iPhone across browsers, apps, and system data.
How much are you worth to Google?
Proton analyzed 54,000 profiles using real ad auction data to determine your worth to Google. How valuable is your data?
Andy Yen, Proton founder and CEO, speaking at Security in the Digital Century, part of Semafor World Economy 2026, in Washington, D.C.
Powerful forces are exploiting parents’ fears to strengthen their toxic business models. Here’s how we stop them.
A computer screen showing a person icon and text boxes sits behind a purple cartoon brain
Should we be worried about AI taking over the world someday? Or is Big Tech distracting us from what it's doing right now?
Illustration of a warning sign with icons of concealed passwords of various lengths
Even with strong passwords and MFA, breaches still happen. See the hidden gaps, common risks, and how to close them effectively.
Illustration representing a person's identity being stolen through a phishing attack
Learn how to build phishing awareness training that helps employees recognize attacks, report them quickly, and reduce risk in your organization.
Independent auditors confirmed Proton Pass is exceptionally secure. See why transparency is our strongest security feature.