all-in-one privacy solution":["Proton Unlimited — комплексное решение для защиты данных"],"Black Friday":["Черная пятница"],"No ads. Privacy by default.":["Без рекламы. Гарантия конфиденциальности"],"People before profits":["Люди важнее прибыли"],"Security through transparency":["Безопасность, основанная на прозрачности"],"The best Proton Mail ${ BLACK_FRIDAY } deals":["${ BLACK_FRIDAY }: лучшие предложения Proton Mail"],"The world’s only community- supported email service":["Единственный в мире сервис электронной почты с поддержкой сообщества"]},"specialoffer:limited":{"${ hours } hour":["${ hours } час","${ hours } часа","${ hours } часов","${ hours } часа"],"${ hoursLeft }, ${ minutesLeft } and ${ secondsLeft } left":["Осталось ${ hoursLeft }, ${ minutesLeft } и ${ secondsLeft }"],"${ minutes } minute":["${ minutes } минута","${ minutes } минуты","${ minutes } минут","${ minutes } минуты"],"${ seconds } second":["${ seconds } секунда","${ seconds } секунды","${ seconds } секунд","${ seconds } секунды"],"Limited time offer":["Ограниченное по времени предложение"]},"specialoffer:listitem":{"Create multiple addresses":["Создавайте несколько адресов"],"Hide-my-email aliases":["Создавайте алиасы hide-my-email"],"Quickly unsubscribe from newsletters":["С легкостью отменяйте подписку на рассылки"],"Use your own domain name":["Используйте собственное доменное имя"]},"specialoffer:logos":{"As featured in":["О нас в СМИ"]},"specialoffer:metadescription":{"Get an encrypted email that protects your privacy":["Электронная почта, защищающая вашу конфиденциальность"]},"specialoffer:metatitle":{"Proton Mail Black Friday Sale - Up to 40% off":["Черная пятница в Proton Mail: скидки до 40 %"]},"specialoffer:newmetadescription":{"Get up to 40% off Proton Mail subscriptions this Black Friday. Find great deals on our secure end-to-end encrypted email plans.":["Получите Proton Mail со скидкой до 40 %. Не пропустите выгодные предложения на планы безопасной электронной почты, зашифрованной сквозным шифрованием, в честь «черной пятницы»."]},"specialoffer:newmetatitle":{"Proton Mail Black Friday sale | Up to 40% off secure email":["«Черная пятница» в Proton Mail | Скидки до 40 %"]},"specialoffer:note":{"* Billed at ${ TOTAL_SUM } for the first year":["* ${ TOTAL_SUM } за первый год."],"*Billed at ${ TOTAL_SUM } for the first 2 years":["* ${ TOTAL_SUM } за первые два года."],"30-day money-back guarantee":["Гарантия возврата средств в течение 30 дней"],"Billed at ${ TOTAL_SUM } for the first 2 years":["${ TOTAL_SUM } за первые 2 года"],"Billed at ${ TOTAL_SUM } for the first year":["${ TOTAL_SUM } за первый год"],"You save ${ SAVE_SUM }":["Вы экономите ${ SAVE_SUM }."]},"specialoffer:off":{"${ DISCOUNT } off":["–${ DISCOUNT }"],"${ PERCENT_OFF } off":["–${ PERCENT_OFF }"]},"specialoffer:testimonial":{"I love my ProtonMail":["Обожаю ProtonMail!"],"My favorite email service":["Мой любимый сервис электронной почты"],"Thanks Proton for keeping us all safe in the complicated internet universe.":["Спасибо Proton за защиту в запутанном интернет-пространстве."],"You get what you pay for. In the case of big tech, if you pay nothing, you get used. I quit using Gmail and switched to @ProtonMail":["Полностью оправданное вложение денег. Бигтех-компании используют тебя, если ты им не платишь. Поэтому я перешла с Gmail на @ProtonMail."]},"specialoffer:time":{"Days":["дн."],"Hours":["ч."],"Min":["мин."]},"specialoffer:title":{"And much more":["И это еще не всё"],"Make your inbox yours":["Настройка на свой вкус"],"Safe from trackers":["Защита от трекеров"],"Stay organized":["Всё по полочкам"],"Black Friday email deals":["Безопасная почта для покупок в «черную пятницу»"],"Don’t just take our word for it":["Отзывы наших клиентов"],"Our story":["Наша история"],"Transfer your data from Google in one click":["Перенесите данные из Gmail в одно нажатие"]},"specialoffer:tooltip":{"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, connect up to 10 devices, access worldwide streaming services, malware and ad-blocker, and more.":["Сохраняйте конфиденциальность в Интернете и получайте доступ к заблокированному контенту. Включает ${ TOTAL_SERVERS } серверов более чем в ${ TOTAL_COUNTRIES } странах с возможностью подключения на 10 устройствах, доступ к стриминговым платформам со всего мира, блокировщик рекламы, функцию защиты от вредоносных программ и другие преимущества."],"Easily share your calendar with your family, friends or colleagues, and view external calendars.":["Предоставляйте доступ к календарю родственникам, друзьям и коллегам, а также просматривайте календари других сервисов"],"Includes support for 1 custom email domain, 10 email addresses, 10 hide-my-email aliases, calendar sharing, and more.":["Включает поддержку 1 пользовательского домена, 10 адресов электронной почты, 10 алиасов hide-my-email, совместный доступ к календарю и другие преимущества."],"Includes support for 3 custom email domains, 15 email addresses, unlimited hide-my-email aliases, calendar sharing, and more.":["Включает поддержку трех пользовательских доменов, 15 адресов электронной почты, неограниченного числа алиасов hide-my-email, совместный доступ к календарю и другие преимущества."],"Manage up to 25 calendars, mobile apps, secured with end-to-end encryption, 1-click calendar import from Google, and more.":["До 25 календарей, мобильные приложения, сквозное шифрование, удобный перенос данных из Google Календаря и другие преимущества"]},"Status Banner":{"At the moment we are experiencing issues with the Proton VPN service":["При использовании сервиса Proton VPN могут возникать проблемы"],"Learn more":["Подробнее"]},"Status banner":{"Learn more":["Подробнее"],"Please note that at the moment we are experiencing issues with the ${ issues[0] } service.":["Сейчас при использовании сервиса ${ issues[0] } могут возникать проблемы."],"We are experiencing issues with one or more services at the moment.":["При использовании одного или нескольких сервисов могут возникать проблемы."]},"suggestions":{"Suggestions":["Предложения"]},"Support":{"Sub category":["Подкатегория","Подкатегории","Подкатегорий","Подкатегорий"]},"Support article":{"${ readingTime } min":["${ readingTime } мин.","${ readingTime } мин.","${ readingTime } мин.","${ readingTime } мин."],"Category":["Категория","Категории","Категорий","Категорий"],"Didn’t find what you were looking for?":["Не нашли желаемый контент?"],"General contact":["Общие контакты"],"Get help":["Получить помощь"],"Legal contact":["Контакты юридического отдела"],"Media contact":["Контакты для прессы"],"Partnerships contact":["Контакты по вопросам партнерства"],"Reading":["Чтение"]},"Support categories":{"Browse Proton product support":["Смотреть ресурсы по поддержке продуктов Proton"]},"Support category":{"There is no article in this category yet.":["В этой категории еще нет статей."]},"Support troubleshooting":{"--- Select ---":["— Выбрать —"],"App version":["Версия приложения"],"Browser":["Браузер"],"Check if this helps":["Возможно, нужный ответ найдется здесь"],"Choose a category for your question":["Выберите категорию запроса"],"Choose a product":["Выберите продукт"],"Did this solve your issue ?":["Удалось ли нам решить вашу проблему?"],"Faster assistance is just a few clicks away — please make your selections":["Выберите подходящие варианты. Всего пара нажатий — и вы на шаг ближе к решению проблемы."],"No, contact support":["Нет, связаться со службой поддержки"],"Proton account":["Аккаунт Proton"],"Proton Bridge":["Proton Bridge"],"Proton Calendar":["Proton Calendar"],"Proton Drive":["Proton Drive"],"Proton for Business":["Proton for Business"],"Proton Mail":["Proton Mail"],"Proton Pass":["Proton Pass"],"Proton VPN":["Proton VPN"],"Thank you for your feedback":["Спасибо за отзыв!"],"Troubleshooting":["Устранение неполадок"],"What can we help with ?":["Чем мы можем вам помочь?"],"Yes":["Да"]},"support_modal_search_query":{"Search query":["Поисковый запрос"]},"support_search_button":{"Search":["Найти"]},"support_search_i_am_looking_for":{"I'm looking for":["Я ищу"]},"SupportForm":{"For a faster resolution, please report the issue from the Bridge app: Help > Report a problem.":["Чтобы быстро устранить проблему в приложении Bridge, выберите «Справка» > «Сообщить о проблеме»."],"Information":["Информация"]},"SupportForm:option":{"Account Security":["Безопасность аккаунта"],"Contacts":["Контакты"],"Custom email domain":["Пользовательский домен адреса электронной почты"],"Email delivery and Spam":["Доставка электронных писем и спам"],"Encryption":["Шифрование"],"Login and password":["Имя пользователя и пароль"],"Merge aliases and accounts":["Объединение псевдонимов и аккаунтов"],"Migrate to Proton":["Переход на Proton"],"Notifications":["Уведомления"],"Other":["Другое"],"Plans and billing":["Тарифы и оплата"],"Proton for Business":["Proton for Business"],"Sign up":["Регистрация"],"Storage":["Хранилище"],"Users, addresses, and identities":["Пользователи, адреса и личные данные"]},"SupportForm:optionIntro":{"Select a topic":["Выберите тему"]},"swiss_baseed_feature":{"Swiss based":["В Швейцарии"]},"Testimonial":{"Awards":["Награды"],"Customers":["Клиенты"],"Featured":["Что о нас говорят"],"Go to testimonial source":["Перейти к источнику отзыва"],"Reviews":["Отзывы"],"Videos":["видео."]},"Text":{"Find the plan that's right for you":["Найдите подходящий план"],"If you need help, check out our ${ supportLink }.":["Если вам нужна помощь, перейдите в ${ supportLink }."],"The page you’re looking for might have been removed, or it could be an\nold link.":["Возможно, страница удалена\nили у вас устаревшая ссылка."]},"Title":{"On this page":["На этой странице"],"Related articles":["Статьи по теме"],"Share ${ thisPage }":["Поделиться ${ thisPage }"],"Thank you!":["Спасибо!"],"this page":["этой страницей"]},"Tooltip":{"More information":["Подробнее"]},"tooltip_calendar":{"Create up to 20 custom & shareable encrypted calendars. On top of that, add up to 5 calendars from friends, family, colleagues, and organizations.":["Есть возможность создать до 20 зашифрованных пользовательских календарей и делиться ими с другими людьми, а также добавить до 5 календарей друзей, родственников, коллег и организаций."]},"tooltip_vpn":{"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, highest VPN speed, ${ TOTAL_VPN_CONNECTIONS } VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Получайте доступ к заблокированному контенту, просматривайте страницы анонимно и пользуйтесь стриминговыми сервисами со всего мира. Мы предлагаем ${ TOTAL_SERVERS } серверов более чем в ${ TOTAL_COUNTRIES } странах, высочайшую скорость VPN, ${ TOTAL_VPN_CONNECTIONS } VPN-подключений, защиту от вредоносных программ, блокировщик рекламы и многое другое."],"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, highest VPN speed, 10 VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Получайте доступ к заблокированному контенту, просматривайте страницы анонимно и пользуйтесь стриминговыми сервисами со всего мира. Мы предлагаем ${ TOTAL_SERVERS } серверов более чем в ${ TOTAL_COUNTRIES } странах, высочайшую скорость VPN, 10 VPN-подключений, защиту от вредоносных программ, блокировщик рекламы и многое другое."]},"version_history_label":{"Version history":["История версий"]},"version_history_tooltip":{"Store up to ${ versionHistoryNumber } versions of each file for up to ${ years } years":["Храните версии каждого файла (до ${ versionHistoryNumber }) не более нескольких лет (${ years })."]},"vpn_features_link":{"View VPN plans":["Посмотреть тарифы VPN"]},"vpn_features_useCase":{"Access blocked content and browse privately":["Доступ к заблокированному контенту и конфиденциальный просмотр веб-страниц"]}}},"unleashApi":"https://account.proton.me/api"};
// We need to import data (the framework context) from the server
// This Astro feature with define:vars works well but creates an inline script
// So we can't directly import the initFramework helper, we have to store the context
window.frameworkContext = frameworkContext;
})();
Many of us use the cloud on a daily basis, sometimes without even realizing it. Backing up photos from your phones, sharing files with friends, and working on shared documents are all examples of cloud computing. While the cloud has revolutionized the way we store and share data, it’s important to acknowledge that it is vulnerable to hacking attempts the same as any other online service.
In this article, we explain how the cloud can be hacked and what you can do to keep your data safe.
The cloud refers to a network of remote servers hosted on the internet that you can use to store and access data and applications. Instead of storing data on physical storage devices (such as hard drives), you can store it in the cloud, making it accessible from any device with an internet connection.
Cloud storage is just one example of how the cloud is used. Chances are you’ve also used cloud-powered services in the following contexts:
Online collaboration tools (Google Docs, Microsoft 365)
Video conferencing software (Zoom, Skype)
Social media platforms (Facebook, Twitter)
Cloud computing platforms (Amazon Web Services, Microsoft Azure)
For businesses, cloud computing offers many benefits. It allows companies to scale IT resources up or down as needed, based on real-time demands. Compared to traditional computing platforms, cloud computing also lets businesses avoid upfront capital expenses associated with purchasing and maintaining physical servers and other networking equipment.
Can the cloud be hacked?
The short answer is yes, the cloud can be hacked. Although many cloud service providers take extensive security measures to protect your data, no system is completely foolproof. Ultimately, your data’s security relies upon the type of encryption used by your cloud service provider.
How can the cloud be hacked?
Weak and reused passwords
Exploiting a weak or reused password is one of the most common ways attackers can hack your cloud storage account. Through brute force attacks, an attacker can easily gain unauthorized access to your account and steal your data. Even strong passwords can be undermined if you reuse them on multiple accounts. If any of those services suffer a data breach, it will expose your password, making every account where you used that password vulnerable.
Attackers might also try to steal your password using phishing scams that try to trick you into revealing your login credentials through deceptive emails or websites.
Data breaches
While most cloud providers prioritize security and invest significantly in protecting their infrastructure, data breaches still occur. In 2022, FlexBooker, a digital scheduling platform, suffered a data breach(new window) that compromised 3.7 million user accounts. Attackers hacked the platform’s cloud servers and stole sensitive user information, including full names, email addresses, and phone numbers. The compromised data ended up being sold on hacker forums.
Social engineering attacks
Cloud providers can also experience data breaches through social engineering attacks. Hackers target the “human loophole” and manipulate company employees into divulging private information to gain access to sensitive information and systems.
In November 2022, popular cloud storage provider Dropbox became a victim of a data breach(new window). An attacker accessed a Dropbox developer’s GitHub account after he fell victim to a phishing attack, stealing 130 internal code repositories. The breach included a few thousand names and email addresses belonging to Dropbox employees, current and past Dropbox customers, sales leads, and vendors.
Third-party vulnerabilities
Cloud providers sometimes work with third-party vendors like content delivery networks and domain name system services to provide a more comprehensive cloud solution. Vulnerabilities in these third-party services, such as software flaws or server misconfigurations, could lead to your data in the cloud being exposed and stolen.
How to protect yourself from cloud hacking
Protecting yourself from cloud hacking involves using strong encryption and following cybersecurity guidelines. Here are some steps you can take to safeguard your data.
Choose end-to-end encrypted cloud storage
Most cloud providers use industry-standard security measures, such as TLS and AES-256, to protect your online accounts, but they aren’t adequate. That’s because the most robust form of security is achieved through end-to-end encryption (E2EE), which ensures your data is protected at the highest level.
Unlike other encryption methods that only encrypt data in transit or at rest, E2EE encrypts your data at all stages, including when it’s being sent, received, and stored. Only you have the private key needed to decrypt the file, meaning nobody can access it without your permission. This means that even if an E2EE cloud service was breached, the hackers would not be able to access your files unless they also got access to your device. If privacy and security are your top concern, you should choose an E2EE cloud provider like Proton Drive.
Use a strong password
A strong password is your first line of defense against unauthorized access to your cloud account, making it harder for hackers to guess or crack your password. If you’re struggling to create and remember strong passwords, use an open-source password manager. A password manager generates and stores your login credentials for your online accounts, and all you need to do is remember the master password that unlocks your password manager.
Protect yourself from phishing attacks
Phishing attacks come in various forms, but the most common is email phishing. Phishing emails appear to come from a legitimate source (for example, your cloud provider) but are in fact a ruse designed to trick you into revealing sensitive information. If you receive a suspicious email or an email from an unknown sender, don’t respond and report it to your email provider immediately.
Enable two-factor authentication
Enabling two-factor authentication (2FA) adds an extra layer of security to your cloud account. As the name suggests, 2FA works by requiring a second form of identification, such as a fingerprint or a faceprint, during the sign-in process. The most secure form of 2FA is security keys. Unlike traditional 2FA methods, security keys aren’t time-sensitive and don’t require a connection to the internet.
Update software regularly
Ensure that all software and applications you use in the cloud are regularly updated with the latest security patches and updates. This not only includes the operating systems and software on your local devices, but also any software or applications used by your cloud service provider.
Protect your files with Proton Drive
Choosing an E2EE cloud provider is the most important step you can take toward ensuring your files’ security. Even if you use a strong password, turn on 2FA, keep your software up to date, and stay on guard for phishing attacks, you’re entrusting your files to your cloud provider. If its security is compromised, then your files are at risk, even if you’ve taken all the other precautions listed above.
With Proton Drive, all your data is automatically encrypted on your device before being uploaded to the cloud. Only you have access to the private key that decrypts the data, so no one else can see your files without your consent. Even if our servers were hacked, your encrypted data would remain inaccessible since hackers do not have your private key.
Revoke share access at any time, or set time-sharing limits
Track file downloads and keep a lookout for suspicious activity
We don’t just encrypt the content of your files — we also encrypt their metadata, including the names of files and folders, file extensions, file sizes, and more. Each file also has its own cryptographic signature that proves it hasn’t been tampered with by outside parties. Signing up for a Proton Drive is free and gives you 1 GB of storage. All the encryption happens behind the scenes, so all you need to do is upload your file. If you’d like to support our mission of building a better, more private internet, consider upgrading to a paid account.
Обеспечьте конфиденциальность своих данных с Proton
Google is one of the biggest obstacles to privacy. The Big Tech giant may offer
quick access to information online, but it also controls vast amounts of your
personal or business data.
Recently, more people are becoming aware of the actual price you
If you’re a United States citizen or permanent resident, you have a Social
Security number (SSN). This number is the linchpin of much of your existence,
linked to everything from your tax records to your credit cards. Theft is a
massive problem, whic
Compromised passwords are a common issue and probably one of the biggest
cybersecurity threats for regular people. How do passwords get compromised, and
is there anything you can do to prevent it?
* What does compromised password mean?
* How do pa
WeTransfer is a popular service used by millions worldwide to send large files.
You may have wondered if it’s safe or whether you should use it to share
sensitive files. We answer these questions below and present a WeTransfer
alternative that may su
Dictionary attacks are a common method hackers use to try to crack passwords and
break into online accounts.
While these attacks may be effective against people with poor account security,
it’s extremely easy to protect yourself against them by usi
Data breaches are increasingly common. Whenever you sign up for an online
service, you provide it with personal information that’s valuable to hackers,
such as email addresses, passwords, phone numbers, and more. Unfortunately, many
online services f