Proton

隱私指南

compromised passwords
en
  • 隱私指南
Compromised passwords are one of the biggest threats for most regular people. But how do passwords become compromised, and what can you do about it?
Is WeTransfer safe?
en
  • 隱私指南
Is WeTransfer secure? We review WeTransfer, determine whether it’s safe to use, and offer our recommendation for a better WeTransfer alternative.
what is a dictionary attack
en
  • 隱私指南
What is a dictionary attack? We go over how these types of cyberattack work and how you can protect your passwords against them.
what is a brute force attack
en
  • 隱私指南
What is a brute force attack? We go over brute force attack examples and ways to prevent this type of cyber attack.
en
  • 隱私指南
Here’s what to do if you're affected by a data breach — protect yourself and your data with Dark Web Monitoring and integrated 2FA by Proton.
chrome password manager
en
  • 隱私指南
How secure is Google Password Manager? We investigate the security and risks of using the default Chrome password manager to store passwords.
sensitive information
en
  • 商業使用
  • 隱私指南
Learn which data is confidential and how to ensure sensitive data protection using a privacy-first tool with end-to-end encryption.
en
  • 隱私指南
Here's what you need to know about social engineering attacks — including examples of social engineering and how to keep your business safe.
is whatsapp safe for sending private photos
en
  • 隱私指南
Is WhatsApp safe for sending private photos? We go over everything you need to know before using this popular messaging app.
passwordless future
en
  • 隱私指南
Is passwordless authentication the way of the future? Here’s why Proton Pass is not preparing to abandon passwords just yet.
is icloud keychain safe
en
  • 隱私指南
Is iCloud Keychain safe? We go over the pros and cons of the Apple password manager.