![keylogger icon](https://blog.mailfence.com/wp-content/uploads/2017/02/What_is_keylogger1-300x300.png)
Is Your Computer Infected with a Keylogger? Here’s Everything You Need to Know
If you’ve found your way to this article, you are likely asking yourself one of these two questions: Luckily, we’ve got all the answers you
If you’ve found your way to this article, you are likely asking yourself one of these two questions: Luckily, we’ve got all the answers you
Send an anonymous email or a private email? These terms are often used interchangeably. But do you know what they mean? In this guide, we
You may have come across the term “digital signatures” online. You may even have digitally signed emails or documents yourself. However, a digital signature is
Symmetric encryption is a core concept in cryptography. In a nutshell, symmetric encryption uses a single key for both encrypting and decrypting data. While that
If you’re like most people, you probably don’t know much about social engineering attacks. Or do you believe it only aims to dupe unsuspecting victims
End-to-end encryption, and more specifically OpenPGP, is an essential part of what we do here at Mailfence. However, OpenPGP encryption isn’t always straightforward, and proper
Phishing is the most well-known social engineering attack, where a cyberattacker pretends to be a reliable source to make their victims reveal their personal information
Shoulder surfing is the practice of stealing sensitive information by looking over another person’s shoulder while they are keying that information into the device. What
Email spoofing is a cyberattack in which a malicious actor impersonates a legitimate sender. They hide their identity by sending an email from a fake
Mailfence offers a secure and private collaborative suite, and all user accounts are protected through standard security and privacy measures (check our high-level security analysis