What is an evil twin attack, and should they worry you?

January 26th, 2024 in Privacy deep dives

An evil twin attack is a cyberattack that occurs when an attacker  sets up a malicious WiFi network that mimics a legitimate one, often in…

Proton VPN Blog

Introducing the new Proton VPN Linux app

November 7th, 2023 in Proton News

For over two years, Proton VPN has been one of a very few VPN services to offer a full Linux app with a graphic user…

What is perfect forward secrecy?

October 31st, 2023 in Privacy deep dives

Perfect forward secrecy (PFS) is a cryptographic feature of internet communication protocols that ensures even if a session is compromised, past and future sessions remain…

What is a zero-day exploit and why are they dangerous?

October 20th, 2023 in Privacy deep dives

A zero-day is a software vulnerability or security flaw in a computer system that its developers or vendors are unaware of. The term zero-day (also…

What is a dedicated IP address and how can it help your business?

October 6th, 2023 in For business

A dedicated IP address is a fixed or static internet protocol (IP) address that’s guaranteed not to change for as long as you lease it.…

What is IKEv2?

September 29th, 2023 in Privacy deep dives

IKEv2 is a VPN protocol used to secure VPN connections. Part of the IPSec protocol suite, it is sometimes (and strictly speaking, more correctly) referred…

Is Amazon Alexa spying on you?

September 26th, 2023 in Privacy deep dives

“Amazon and third parties (including advertising and tracking services) collect smart speaker interaction data. We find that Amazon processes voice data to infer user interests…

What is a VPN kill switch and when should you use one?

September 15th, 2023 in Privacy basics

A kill switch is a security feature that protects your privacy. It ensures that you don’t connect to the internet thinking you’re protected by a…

Guest networks – What they are, why you need one, and how to set them up

September 12th, 2023 in Privacy basics

A guest network is a separate WiFi network within your home or office network designed specifically for your guests or customers to use.  Although run…

Can someone see my internet history if we use the same WiFi?

September 1st, 2023 in Privacy basics

Before WiFi, you had to connect your internet-capable device to a router via an Ethernet cable. The router then connected to a modem, which connected…

Secure
your internet

Get Proton VPN
Get Proton VPN