Proton

Руководства по конфиденциальности

What is email spoofing?
en
  • Руководства по конфиденциальности
Learn how to identify forged email messages and protect yourself against email spoofing, a common trick in phishing and spam emails.
en
  • Руководства по конфиденциальности
Daniel Huigens, the head of Proton’s cryptography team, explains how the latest crypto refresh makes PGP more secure.
en
  • Руководства по конфиденциальности
If you’re migrating from iPhone to Android, there are a few ways to transfer your data. Here are the top three methods.
What is the CAN-SPAM Act?
en
  • Руководства по конфиденциальности
Know your rights under the US CAN-SPAM Act to help you identify and beat spam and comply if you send marketing emails.
en
  • Руководства по конфиденциальности
CAPTCHAs perform a vital function, protecting websites from automated bots that can create fake accounts or DDoS attacks.
How to stop spam emails
en
  • Руководства по конфиденциальности
Learn how to beat annoying and potentially harmful spam and keep your email private and secure with Proton Mail.
en
  • Руководства по конфиденциальности
There are two easy ways to password protect an Excel file. This article explains how to encrypt files in Excel or using encrypted cloud storage.
What is email security?
en
  • Руководства по конфиденциальности
Learn about email security, types of email attacks, and 10 tips to secure your mailbox against common cyberthreats.
en
  • Руководства по конфиденциальности
Your email address is an identifier tech giants use to track you and exploit your personal data. Learn how to protect yours.
en
  • Руководства по конфиденциальности
Cloud storage and physical storage options have advantages and disadvantages. Learn more about each one.
en
  • Руководства по конфиденциальности
Google claims privacy should be available to everyone. But this claim requires a new definition of privacy that doesn’t hold up to scrutiny.