Proton is privacy by default. Welcome to a better internet where privacy and freedom come first. Our encrypted services help you fight for a better internet that is secure and private by default.
This streamer got deepfaked. Then the men showed up at her door.
Sweet Anita, one of Twitch’s most recognizable streamers, took all the right precautions. Then she got deepfaked.
How to get to inbox zero: Privacy-first inbox organization tips
The inbox zero method still works. Here's how to organize your inbox, simplify your workflow, and free up time for your most important tasks.
A complete guide to the new 2025 NIST password guidelines
Everything you need to know about the 2025 NIST password recommendations. Learn about the latest updates, implementation tips, and more.
Built for speed and the future: Introducing Proton Mail’s brand new mobile apps
See what’s new in the redesigned Proton Mail app for iOS and Android. Enjoy offline mode and a smoother experience on both platforms.
How to send a follow-up email after an interview (templates included)
Interview follow up emails are far more than good form. Stand out from other candidates with these five professional templates.
How to write an email: From subject to signature (+ templates)
Learn how to write a proper email for all situations — big or small — and get your message noticed with these customizable templates.
LinkedIn will soon use your data to train AI. Here’s what you can do to opt out.
LinkedIn will share your public data with Microsoft to train AI. Find what this means for your privacy and how to opt out.
How to get more iPhone storage with this private iCloud alternative
Running out of iPhone storage? Find out how to free up space, manage files, and maintain data privacy with Proton Drive.
How to prevent unauthorized access to your business network
Cybercriminals will take any opportunity to gain unauthorized access to your servers. Learn how you can stop them.
Proton VPN offers exciting new business features
Proton for Business now offers MDM support, more dedicated servers, and gateway monitoring.
CometJacking: One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief
Cybersecurity researchers have disclosed details of a new attack called CometJacking targeting Perplexity's agentic AI browser Comet by embedding malicious (…)
4 October
New Study Warns Several Free iOS and Android VPN Apps Leak Data
A Zimperium zLabs analysis of 800 free Android and iOS VPN apps exposes critical security flaws, including the Heartbleed bug, excessive system permissions, (…)
4 October
Qubes OS Summit 2025: videos and slides
Qubes OS Summit 2025 has concluded! Thank you to our sponsors, presenters, attendees, and organizers for making this year’s summit a success! If you missed (…)
30 September
Critical Security Flaw in MyCourts: What Tennis Clubs Need to Know
A serious security vulnerability has been discovered in MyCourts, the popular tennis court booking and… Critical Security Flaw in MyCourts: What Tennis (…)
29 September