Social Engineering: What is Phishing?
Phishing (pronounced “fishing”) is a kind of identity theft that is growing in popularity amongst hackers. By using fraudulent websites and false emails, fake phone calls, and whatnot – perpetrators attempt...
Phishing (pronounced “fishing”) is a kind of identity theft that is growing in popularity amongst hackers. By using fraudulent websites and false emails, fake phone calls, and whatnot – perpetrators attempt...
WHAT IS PRETEXTING? Pretexting is another form of social engineering where attackers focus on creating a good pretext, or a fabricated scenario, that they can use to try stealing their...
This blogpost will explain how to read and understand the email header which travels with every email. It contains details about the sender, taken route and the receiver. Use this...
In this blogpost, we will look at the most common threats to online privacy and digital security. You will increase your awareness of common threats, but also learn tips on...
In this blogpost, we compare POP3 vs IMAP vs Exchange ActiveSync. We will see how these protocols work. What are their pros and cons? We will conclude by giving tips...
SMiShing (short of SMS phishing) is an emerging security threat. It is a technique that uses mobile phone text messages (SMS) to trick victims into taking an immediate action. Why...
Mailfence secure and private email service comes with an easy to use integrated keystore that supports wide range of functionalities for managing OpenPGP keys. In this blogpost we highlight those...
Vishing is a combination of the word “voice” and the word “phishing”. Therefore it refers to phishing scams done over the phone. Individuals are tricked into revealing critical financial or...
There are plenty of reasons to use a virtual machine or VM from a security and privacy stand-point. In this blogpost, we will list some of them that will help...