Latest articles

en
A zero-day is a previously unknown software vulnerability. A zero-day exploit is
a cyberattack that takes advantage of a zero-day.

en
- 개인정보 보호 심층 분석
IKEv2 is a VPN protocol used to secure a VPN connection. Part of the IPsec
protocol suite, it is sometimes referred to as IKEv2/IPsec.

en
- 개인정보 보호 심층 분석
Amazon Alexa devices undoubtedly bring unparalleled convenience to our lives.
But this convenience comes at the price of privacy.

en
A kill switch is a security feature that protects your IP address in case you
unexpectedly lose your connection to a VPN server.

en
A guest network lets you offer safe WiFi access for friends, office staff,
customers, and iOT devices without compromising your own WiFi security.

- 개인정보 보호 기본 사항
이 기사에서는 WiFi를 사용할 때 누가 인터넷 기록을 볼 수 있는지, 무엇을 볼 수 있는지, 왜 보는지에 대해 알아봅니다.

en
- Proton VPN 뉴스
Proton VPN for Business makes network segmentation and access control easy,
providing secure internet access and all-around network security.

en
- 개인정보 보호 기본 사항
Tor Browser is a powerful privacy tool that lets you browse onion sites and
protect your identity. Here’s how it works.

en
In this article, we look at what a MAC address is and whether it poses a risk to
your privacy or security.

en
- Proton 스토리
See what independent reviewers are saying about the security and advanced
features that come with Proton VPN's premium VPN plans.

en
Cyberattacks target weak security systems and unsuspecting victims. Learn the
main cyberattack types and how to protect yourself.