Proton is privacy by default. Welcome to a better internet where privacy and freedom come first. Our encrypted services help you fight for a better internet that is secure and private by default.
How to send a secure email in Gmail, Outlook, Proton Mail, and more
Here's a simple, step-by-step guide to sending secure emails using Gmail, Outlook, Proton Mail, and more to keep all of your communications safe.
10 out of office message templates + tips on how to write yours
Less screen time, more beach time — these are the only 10 out of office message examples you'll need before your summer holiday.
12 email management tips to organize your inbox and improve creativity
These 12 email management strategies will help you declutter your inbox, stay organized, and enhance your focus throughout the workday.
Prepare for the unexpected with emergency access for your Proton Account
When something unexpected happens, make sure your loved ones can get the critical data they need with Emergency Access for your Proton Account.
Facial recognition technology: When your face becomes a commodity
Facial recognition technology turns your face into data for ads, surveillance, and tracking. Learn the risks — and how to protect your identity.
Google suffers data breach, puts out Gmail warning
Google has warned Workspace users that they should change to passkeys after a surge in phishing attacks. Learn more and what you can do.
Are MDM solutions the right choice for your business?
An MDM solution can help you secure your business network, but do you need one? Find out if there's a better option.
How to build a BYOD policy for your business (with a free template)
Looking to implement BYOD within your business? Create your policy with our free template and find how how to secure your business data.
Introducing a smarter, faster Lumo 1.1
Lumo 1.1 is a faster, smarter AI assistant that matches Big Tech’s capabilities while protecting your privacy with zero-access encryption.
Data brokers really don’t want to let you delete your data
Several recent studies have found data brokers in the US ignoring data requests, hiding opt-out pages, and more. Learn what you can to do to fight back.
Black Hat 2025: Microsoft’s Threat Intel Experts Are “The Nerds In The Back”
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Aug. 28, 2025 – Listen to the podcast When a cyberattack occurs, (…)
28 August
UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats
A China-nexus threat actor known as UNC6384 has been attributed to a set of attacks targeting diplomats in Southeast Asia and other entities across the (…)
25 August
Changes and updates Update Tor Browser to 14.5.6. Update the Tor client to 0.4.8.17. Update Thunderbird to 128.13.0. Fixed problems Remove irrelevant (…)
21 August
A Google Calendar Flaw Could Allow Hijacking Gemini Via Malicious Invites
Researchers discovered a major security flaw in Google Calendar that could allow hijacking Gemini agents… A Google Calendar Flaw Could Allow Hijacking (…)
20 August