Últimos artículos
en
- Guías de privacidad
Is WeTransfer secure? We review WeTransfer, determine whether it’s safe to use,
and offer our recommendation for a better WeTransfer alternative.
en
- Guías de privacidad
What is a dictionary attack? We go over how these types of cyberattack work and
how you can protect your passwords against them.
en
- Actualizaciones del producto
- Proton Pass
Proton Pass Monitor is an advanced security feature that detects credential
leaks and helps you defend your accounts.
en
Here are seven new business features for Proton Mail and Proton Calendar to help
teams collaborate more efficiently.
en
- Guías de privacidad
What is a brute force attack? We go over brute force attack examples and ways to
prevent this type of cyber attack.
en
- Novedades de privacidad
Any privacy-focused company in the US faces numerous legal challenges, including
multiple programs that allow for warrantless wiretaps.
en
- Guías de privacidad
Here’s what to do if you're affected by a data breach — protect yourself and
your data with Dark Web Monitoring and integrated 2FA by Proton.
en
- Actualizaciones del producto
- Proton Mail
With Dark Web Monitoring, you can have Proton watch for data leaks, ensuring you
can change the passwords to accounts affected by a breach.
en
- Actualizaciones del producto
- Proton Pass
Proton Pass now distributes its app on the open source app repository F-Droid,
giving you more privacy and freedom.
en
- Guías de privacidad
How secure is Google Password Manager? We investigate the security and risks of
using the default Chrome password manager to store passwords.
en
- Para empresas
- Guías de privacidad
Learn which data is confidential and how to ensure sensitive data protection
using a privacy-first tool with end-to-end encryption.