
Proton is privacy by default. Welcome to a better internet where privacy and freedom come first. Our encrypted services help you fight for a better internet that is secure and private by default.
How to turn off Copilot and protect your data from Microsoft’s AI
Find out how to disable Copilot AI on Windows, limit Microsoft’s data collection, and protect your privacy and security from AI training.
Help us choose recipients for our 2025 Lifetime Account Charity Fundraiser!
Join Proton’s 2025 Lifetime Fundraiser and help decide which organizations receive grants supporting privacy, free speech, and human rights.
Inbox detox: How to reclaim your email before Black Friday
The average adult receives 80 emails a day, and roughly half of that is spam. Learn how to take control of your inbox before Black Friday makes this even worse.
Proton Pass is protected against clickjacking attacks
Following a report about clickjacking at DEF CON 33, we addressed a vulnerability in Proton Pass: Find out more
Large organizations aren’t paying ransomware threats anymore: SMBs are
Ransomware groups are avoiding large organizations and targeting SMBs for smaller payments instead: Find out how to protect your business
Top 5 network security tools to protect your business
Network security tools protect your organization’s data, systems, and users from cyber threats. We look at the best solutions for protecting your business.
We’re offering 2 years of Proton Pass to cultural institutions worldwide
To help defend our cultural heritage, Proton Pass Professional password manager plans are free for two years to qualifying organizations. Learn more.
How and why to turn off Meta’s personalized ads
Meta is knowingly targeting you with scams and counterfeit goods ads. Turning off personalized ads is a small but meaningful pushback against this.
How to disable Windows Recall and stop your PC from recording everything you do
Find out how to disable Microsoft Recall on Windows 11, stop it from taking snapshots of your PC activity, and why it raises privacy concerns.
BYOD security solutions explained
Your business needs BYOD security solutions to help workers protect your critical business data, no matter where they're working from

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels
The North Korean threat actors behind the Contagious Interview campaign have once again tweaked their tactics by using JSON storage services to stage (…)
14 November

CISA Warns of Active Attacks on Cisco ASA and Firepower Flaws
CISA issues an urgent directive for all organizations to patch Cisco ASA and Firepower devices against CVE-2025-20362 and CVE-2025-20333, exploited in the (…)
14 November

Cybersecurity Lessons For Leaders: Designing Resilience at Scale
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Nov. 14, 2025 – Read the full story in Forbes “As an AI entrepreneur (…)
14 November

When Language Speaks Faster Than We Can Type: The Rise of Smart Speech-to-Text Tools
If you pay attention to how people communicate now, it’s pretty clear that talking has… When Language Speaks Faster Than We Can Type: The Rise of Smart (…)
13 November