The Proton Blog.

Hacker Magazines & Publications.

Official Website The Proton Blog

Proton is privacy by default. Welcome to a better internet where privacy and freedom come first. Our encrypted services help you fight for a better internet that is secure and private by default.


28 August

How to send a secure email in Gmail, Outlook, Proton Mail, and more

Here's a simple, step-by-step guide to sending secure emails using Gmail, Outlook, Proton Mail, and more to keep all of your communications safe.


28 August

10 out of office message templates + tips on how to write yours

Less screen time, more beach time — these are the only 10 out of office message examples you'll need before your summer holiday.


28 August

12 email management tips to organize your inbox and improve creativity

These 12 email management strategies will help you declutter your inbox, stay organized, and enhance your focus throughout the workday.


28 August

Prepare for the unexpected with emergency access for your Proton Account

When something unexpected happens, make sure your loved ones can get the critical data they need with Emergency Access for your Proton Account.


27 August

Facial recognition technology: When your face becomes a commodity

Facial recognition technology turns your face into data for ads, surveillance, and tracking. Learn the risks — and how to protect your identity.


26 August

Google suffers data breach, puts out Gmail warning

Google has warned Workspace users that they should change to passkeys after a surge in phishing attacks. Learn more and what you can do.


26 August

Are MDM solutions the right choice for your business?

An MDM solution can help you secure your business network, but do you need one? Find out if there's a better option.


26 August

How to build a BYOD policy for your business (with a free template)

Looking to implement BYOD within your business? Create your policy with our free template and find how how to secure your business data.


21 August

Introducing a smarter, faster Lumo 1.1

Lumo 1.1 is a faster, smarter AI assistant that matches Big Tech’s capabilities while protecting your privacy with zero-access encryption.


19 August

Data brokers really don’t want to let you delete your data

Several recent studies have found data brokers in the US ignoring data requests, hiding opt-out pages, and more. Learn what you can to do to fight back.

You Can’t Arrest An Idea

Cybercrime Magazine

Black Hat 2025: Microsoft’s Threat Intel Experts Are “The Nerds In The Back”

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Aug. 28, 2025 – Listen to the podcast When a cyberattack occurs, (…)

28 August

The Hacker News

UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats

A China-nexus threat actor known as UNC6384 has been attributed to a set of attacks targeting diplomats in Southeast Asia and other entities across the (…)

25 August

Tor Project

New Release: Tails 6.19

Changes and updates Update Tor Browser to 14.5.6. Update the Tor client to 0.4.8.17. Update Thunderbird to 128.13.0. Fixed problems Remove irrelevant (…)

21 August

Latest Hacking News

A Google Calendar Flaw Could Allow Hijacking Gemini Via Malicious Invites

Researchers discovered a major security flaw in Google Calendar that could allow hijacking Gemini agents… A Google Calendar Flaw Could Allow Hijacking (…)

20 August

Red Cross

We stand with Ukraine

The Russian government’s attack on Ukraine has put millions of innocent lives in danger. We stand with Ukraine to support their freedom and to defend democracy. If you wish to support Ukraine and its people in their time of need, please consider donating to the Red Cross.

Your data is YOUR data

eFoundation is a non-profit organization leading the development of Open Source mobile operating systems that respect users’ data privacy.

Signal

Signal

Speak Freely

Tor Browser

Tor Browser

Tor protects your privacy

NordVPN

Protect all your devices.

Secure, high-speed VPN