Steps To Take When Your Email Is Hacked
Think your email account may have been hacked? Most of us use email so often and from so many machines that it might be hacked one day. But don’t panic....
Think your email account may have been hacked? Most of us use email so often and from so many machines that it might be hacked one day. But don’t panic....
A virtual machine is another practical method to improve your security and privacy by protecting your device (computer, server) from many cyber threats, preventing it from getting compromised. But don’t...
OpenPGP is one of the standard protocols for encryption/signature of data. It is the most widely used email encryption standard. It’s also one of the ways Mailfence provides security and...
This blog post provides details over the SSL/TLS certificate for the Mailfence knowledge base (KB). A modern browser should automatically check the validity of the Mailfence KB SSL/TLS certificate and...
Most people send emails every day. Therefore, protecting your email account is a must. Especially when you know that emails are the favourite way for hackers to access your data....
Less than 1 second : that’s how long it will take for a fairly savvy hacker to crack the password “qazwsxedc”. So, more than ever, you need to avoid bad password...
Ransomware, Phishing, Trojan horses … We live in a world where cyber threats are becoming more present and more sophisticated. Data theft, reputational damage, extortion, espionage, and data destruction, …...
Since the start of the Covid-19 pandemic, the number of cyber attacks on organizations and individuals has exploded. It is therefore more important than ever to keep your data and...
Vishing is a combination of “voice” and “phishing”. It refers to phishing scams done over the phone. Individuals are tricked into revealing critical financial or personal information during seemingly trustworthy...
Smishing is a social engineering attack using phishing techniques, but sent by text message instead of email. The name is a combination of SMS and phishing. In this post, you’ll...