How to Recognize Social Engineering Attacks?
If you’re like most people, you probably don’t know much about social engineering. Or you believe it only aims to dupe unsuspecting victims to steal some money. But what you...
If you’re like most people, you probably don’t know much about social engineering. Or you believe it only aims to dupe unsuspecting victims to steal some money. But what you...
Mailfence offers a secure and private collaborative suite, and all user accounts are protected through standard security and privacy measures (check our high-level security analysis for more information). However, as...
Ransomware is software developed to scramble infected computer systems, computers, tablets, or smartphones screen content or files so that data become unreadable. Hackers can then claim a ransom to unlock...
“Zombie” is the term used when an attacker takes control of your computer without your knowledge. A zombie attack aimed either to steal your sensitive information or to make...
Think your email account may have been hacked? Most of us use email so often and from so many machines that it might be hacked one day. But don’t panic....
A virtual machine is another practical method to improve your security and privacy by protecting your device (computer, server) from many cyber threats, preventing it from getting compromised. But don’t...
This blog post provides details over the SSL/TLS certificate for the Mailfence knowledge base (KB). A modern browser should automatically check the validity of the Mailfence KB SSL/TLS certificate and...
Most people send emails every day. Therefore, protecting your email account is a must. Especially when you know that emails are the favourite way for hackers to access your data....
Less than 1 second : that’s how long it will take for a fairly savvy hacker to crack the password “qazwsxedc”. So, more than ever, you need to avoid bad password...
Ransomware, Phishing, Trojan horses … We live in a world where cyber threats are becoming more present and more sophisticated. Data theft, reputational damage, extortion, espionage, and data destruction, …...