zero access encryption

What is zero-access encryption and why it is important for security

May 23rd, 2018 in Security

Some of your most sensitive data sit on the cloud, on the servers of Internet service providers. Zero-access encryption gives you control over your data online. Most of us would not give our private, personal information to strangers and then trust them not to leak it. But that’s essentially what we do every time we …

No, PGP is not broken, not even with the Efail vulnerabilities

May 15th, 2018 in Encryption, Security

Recently, news broke about potential vulnerabilities in PGP, dubbed Efail. However, despite reports to the contrary, PGP is not actually broken, as we will explain in this post. The vulnerability report, which came with its own website, efail.de, has attracted a lot of headlines such as the one below, along with recommendations to disable the …

protonmail-onion-ssl-certificate-IM

Our Tor encrypted email site has a new SSL certificate

March 27th, 2018 in Security

As part of our commitment to security, we maintain a Tor onion site for ProtonMail which can provide extra privacy and accessibility in countries where ProtonMail is blocked. ProtonMail is one of the only email providers that offers email access over Tor. We launched the ProtonMail onion site last year as an extra way to …

5 Essential Steps to Keep Your Email Safe

March 1st, 2018 in Security

Your email account is a gold mine for hackers. And yet many people still aren’t taking basic precautions to secure their accounts. Here are five essential steps for safe email. Hacks are surprisingly commonplace. In 2014, for instance, nearly half of all American adults had some form of data stolen from corporate servers in a …

Online Security Guide for Journalists

February 9th, 2018 in Security

Whether you cover the CIA or city hall, journalism is as much about keeping secrets as exposing them. We created this online security guide to help democracy’s defenders defend themselves too. Part of our mission at ProtonMail has always been to give journalists, dissidents, and others the tools and knowledge they need to do their …

protonmail vs gmail security

Why ProtonMail Is More Secure Than Gmail

October 22nd, 2017 in Security

ProtonMail is an encrypted email service that takes a radically different approach to email security. Find out how ProtonMail security compares to Gmail security. In 2014, ProtonMail became the world’s first email service to protect data with end-to-end encryption, and today is the world’s most popular secure email service with millions of users worldwide. ProtonMail’s …

How to keep your bitcoins safe

How to Keep Your Bitcoins Safe from Theft and Hacks

October 6th, 2017 in Security

Security is a key consideration when it comes to Bitcoin. Here’s how you can keep your Bitcoins safe from theft and hacking. When you invest in Bitcoin, there isn’t just the worry that the price of Bitcoin will drop, but also the possibility that your Bitcoin will be stolen. Unlike traditional investments, there is very …

prevent email hacking

Prevent email hacking by taking these three important steps

September 27th, 2017 in Security

These days, email breaches are becoming increasingly common for enterprises. There are however reliable ways to prevent email breaches, or reduce their impact. It should really come as no surprise that email hacks are on the rise. As businesses go digital, email data is becoming increasingly valuable for hackers. While the trending topic this week …

Keeping Email Safe from the ROPEMAKER Vulnerability

September 4th, 2017 in Security

In late August, a security advisory was published regarding a newly discovered exploit affecting email providers.The issue, dubbed as “ROPEMAKER”, stands for “Remotely Originated Post-delivery Email Manipulation Attacks Keeping Email Risky”. The attack is an interesting one so our security team took a closer look at it. The RopeMaker technique allows an attacker to visually …

nsa cyberattack wannacry ransomware

Important lessons from the first NSA-powered ransomware cyberattack

May 15th, 2017 in Security

Last Friday, a weaponized version of a NSA exploit was used to infect over three hundred thousand computers in over 150 countries with the WannaCry ransomware. In addition to government ministries and transportation infrastructure, the British National Health Service (NHS) was crippled, disrupting treatment and care for thousands of patients, and putting countless lives at …

How to Prevent Phishing Attacks

May 10th, 2017 in Security

A typical way of getting hacked is falling for a phishing attack. In fact, most of the large data breaches in recent years have been due to phishing.   The number of phishing attacks is increasing because they are both easy to execute and highly effective. Even if the eventual goal of an attacker is an …

best vpn service

How to pick the best VPN service

March 7th, 2017 in Security

As the world’s largest encrypted email provider, people have frequently asked us what is the best VPN service. In this article, we discuss what to be aware of when choosing a VPN service, and our recommended VPN security requirements. What is a VPN? A Virtual Private Network (VPN) is a tool to secure your internet …

Get your secure email account
Create Account

Proton Technologies AG

Chemin du Pré-Fleuri, 3
CH-1228 Plan-les-Ouates, Genève, Switzerland

For support inquiries, please visit
protonmail.com/support

For security related discussions
security@protonmail.ch