Latest articles
en![](https://pmecdn.protonweb.com/image-transformation/?s=c&image=image%2Fupload%2Fv1693302053%2Fstatic%2Fflags%2Fen_kcfprj.svg)
- Privacy guides
What do you call an email conversation? Here's the difference between an email
thread, email string, an email trail, and more — and when you should use which.
en![](https://pmecdn.protonweb.com/image-transformation/?s=c&image=image%2Fupload%2Fv1693302053%2Fstatic%2Fflags%2Fen_kcfprj.svg)
- Privacy guides
Identity theft affects millions of people worldwide, causing billions in damage.
Here are 5 proven methods for identity theft prevention.
en![](https://pmecdn.protonweb.com/image-transformation/?s=c&image=image%2Fupload%2Fv1693302053%2Fstatic%2Fflags%2Fen_kcfprj.svg)
Google is one of the biggest obstacles to privacy. This article will explore how
and why to deGoogle yourself to reclaim and protect your digital privacy.
en![](https://pmecdn.protonweb.com/image-transformation/?s=c&image=image%2Fupload%2Fv1693302053%2Fstatic%2Fflags%2Fen_kcfprj.svg)
- Privacy guides
What should you do if someone steals your Social Security number? We explain
what you can do if your SSN is stolen and how to protect it.
en![](https://pmecdn.protonweb.com/image-transformation/?s=c&image=image%2Fupload%2Fv1693302053%2Fstatic%2Fflags%2Fen_kcfprj.svg)
- Privacy guides
Compromised passwords are one of the biggest threats for most regular people.
But how do passwords become compromised, and what can you do about it?
en![](https://pmecdn.protonweb.com/image-transformation/?s=c&image=image%2Fupload%2Fv1693302053%2Fstatic%2Fflags%2Fen_kcfprj.svg)
- Privacy guides
Is WeTransfer secure? We review WeTransfer, determine whether it’s safe to use,
and offer our recommendation for a better WeTransfer alternative.
en![](https://pmecdn.protonweb.com/image-transformation/?s=c&image=image%2Fupload%2Fv1693302053%2Fstatic%2Fflags%2Fen_kcfprj.svg)
- Privacy guides
What is a dictionary attack? We go over how these types of cyberattack work and
how you can protect your passwords against them.
en![](https://pmecdn.protonweb.com/image-transformation/?s=c&image=image%2Fupload%2Fv1693302053%2Fstatic%2Fflags%2Fen_kcfprj.svg)
- Product updates
- Proton Pass
Proton Pass Monitor is an advanced security feature that detects credential
leaks and helps you defend your accounts.
en![](https://pmecdn.protonweb.com/image-transformation/?s=c&image=image%2Fupload%2Fv1693302053%2Fstatic%2Fflags%2Fen_kcfprj.svg)
Here are seven new business features for Proton Mail and Proton Calendar to help
teams collaborate more efficiently.
en![](https://pmecdn.protonweb.com/image-transformation/?s=c&image=image%2Fupload%2Fv1693302053%2Fstatic%2Fflags%2Fen_kcfprj.svg)
- Privacy guides
What is a brute force attack? We go over brute force attack examples and ways to
prevent this type of cyber attack.
en![](https://pmecdn.protonweb.com/image-transformation/?s=c&image=image%2Fupload%2Fv1693302053%2Fstatic%2Fflags%2Fen_kcfprj.svg)
Any privacy-focused company in the US faces numerous legal challenges, including
multiple programs that allow for warrantless wiretaps.