Latest articles
Google is one of the biggest obstacles to privacy. This article will explore how
and why to deGoogle yourself to reclaim and protect your digital privacy.
- Privacy guides
What should you do if someone steals your Social Security number? We explain
what you can do if your SSN is stolen and how to protect it.
- Privacy guides
Compromised passwords are one of the biggest threats for most regular people.
But how do passwords become compromised, and what can you do about it?
- Privacy guides
Is WeTransfer secure? We review WeTransfer, determine whether it’s safe to use,
and offer our recommendation for a better WeTransfer alternative.
- Privacy guides
What is a dictionary attack? We go over how these types of cyberattack work and
how you can protect your passwords against them.
- Product updates
- Proton Pass
Proton Pass Monitor is an advanced security feature that detects credential
leaks and helps you defend your accounts.
Here are seven new business features for Proton Mail and Proton Calendar to help
teams collaborate more efficiently.
- Privacy guides
What is a brute force attack? We go over brute force attack examples and ways to
prevent this type of cyber attack.
Any privacy-focused company in the US faces numerous legal challenges, including
multiple programs that allow for warrantless wiretaps.
- Privacy guides
Here’s what to do if your data has been leaked — and how to protect yourself and
your data with Dark Web Monitoring by Proton Mail.
- Product updates
- Proton Mail
With Dark Web Monitoring, you can have Proton watch for data leaks, ensuring you
can change the passwords to accounts affected by a breach.