Proton

隱私指南

en
  • 隱私指南
Learn what a rainbow table attack is and how to stop this kind of data breach, safeguarding your confidential information.
en
  • 隱私指南
Discover the types of identity theft that can damage your financial health and credit score. Get simple tips to protect your data from thieves.
en
  • 隱私指南
What do you call an email conversation? Here's the difference between an email thread, email string, an email trail, and more — and when you should use which.
en
  • 隱私指南
Identity theft affects millions of people worldwide, causing billions in damage. Here are 5 proven methods for identity theft prevention.
  • 隱私指南
Google 是隱私的最大障礙之一。本文將探討如何以及為什麼要讓自己去 Google 化 (deGoogle) 以收回並保護您的數位隱私。
What to do if someone steals your Social Security number
en
  • 隱私指南
What should you do if someone steals your Social Security number? We explain what you can do if your SSN is stolen and how to protect it.
compromised passwords
en
  • 隱私指南
Compromised passwords are one of the biggest threats for most regular people. But how do passwords become compromised, and what can you do about it?
Is WeTransfer safe?
en
  • 隱私指南
Is WeTransfer secure? We review WeTransfer, determine whether it’s safe to use, and offer our recommendation for a better WeTransfer alternative.
what is a dictionary attack
en
  • 隱私指南
What is a dictionary attack? We go over how these types of cyberattack work and how you can protect your passwords against them.
what is a brute force attack
en
  • 隱私指南
What is a brute force attack? We go over brute force attack examples and ways to prevent this type of cyber attack.
en
  • 隱私指南
Here’s what to do if you're affected by a data breach — protect yourself and your data with Dark Web Monitoring and integrated 2FA by Proton.