Privacy basics
- Privacy basics
On the subject of cybersecurity, one term that often comes up is brute force
attack. A brute force attack is any attack that doesn’t rely on finesse, but
instead uses raw computing power to crack security or even the underlying
encryption.
In this a
- Privacy basics
In response to the growing number of data breaches, Proton Mail offers a feature
to paid subscribers called Dark Web Monitoring. Our system checks if your
credentials or other data have been leaked to illegal marketplaces and alerts
you if so. Often
You likely know you should store and manage your passwords safely. However, even
if you are using a password manager, there’s a chance the one you’re using isn’t
as secure as it could be. In this article we go over the threats some password
managers
We all have sensitive personal information we’d all rather not share, whether
it’s documents, photographs, or even private video. This article covers how to
handle sensitive information or records, and what you can do to keep private
information priv
Social engineering is a common hacking tactic involving psychological
manipulation used in cybersecurity attacks to access or steal confidential
information.
They then use this information to commit fraud, gain unauthorized access to
systems, or, in
- Privacy basics
WhatsApp is the world’s leading messaging app, trusted by billions of people
around the globe to send and receive messages. However, is WhatsApp safe for
sending private photos? Or are there better ways to share photos online
privately? Let’s find ou
- Privacy basics
With the advent of passkeys, plenty of people are predicting the end of
passwords. Is the future passwordless, though? Or is there room for both types
of authentication to exist side-by-side?
At Proton, we are optimistic about passkeys and have int
- Privacy basics
If you’re on any Apple device, you’re familiar with the iCloud Keychain, the
Apple password manager. It’s a handy tool that stores passwords for you and
helps you manage your logins.
For a program that stores all your most sensitive data in one pla
Your private videos are for your eyes only. However, not all cloud storage
services are good at storing videos securely, let alone privately. In this
article we explain what you can do to keep file sharing companies from having
access to the videos y
Many email services, citing security reasons, require a phone number for
identity verification. This creates an unfortunate paradox in which you must
give up a highly sensitive piece of personal data to Big Tech.
But there are simple ways to create
Protecting a folder with a password is a simple yet effective way of securing
files. You may wonder whether you can password-protect a folder in Google Drive.
We explain what access controls Google Drive offers and what you can do to
improve your sec