Email security and privacy awareness course
Achieving online privacy and security is not an easy feat, so that’s why we created this email security and privacy course to enrich the learning and awareness of our users. For that reason, we made
Achieving online privacy and security is not an easy feat, so that’s why we created this email security and privacy course to enrich the learning and awareness of our users. For that reason, we made
In a recent post, we discussed the OpenPGP encryption best practices. Digital signatures on the other hand are also a vital part of OpenPGP which gets used both by advanced and entry level users. In this blogpost we would
Strong encryption is no longer a privilege of geeks and paranoids but is becoming mainstream. However, true end-to-end encryption is not out-of-the-box and generally requires you to activate a number of switches as described in this
Recently, we’ve been asked by several users about using Mailfence secure and private email suite via Tor in order to enhance their online anonymity. The answer is yes, you can easily access your Mailfence account
Yahoo recently confirmed a massive breach of over 500 million email accounts, including both credentials and security questions. At Mailfence – a secure and private email service, the security team was closely monitoring developments since
Recently a GNU/Linux TCP vulnerability was disclosed (CVE-2016-5696) by security researchers in the US. Upon analysis, this bug did not pose a threat to our users. Nevertheless, we have already taken supplementary measures in the last
The underlying 1980s transport protocol used to send emails: Simple Mail Transfer Protocol (SMTP) is ancient and lacks the ability to provide email security. To level-up its security, SMTP STARTTLS was invented in 2002 –
When accessing any of the Mailfence services, the transmission of data between your device program and our servers in Brussels-Belgium is always encrypted and protected by SSL/TLS – for which each website has a (Public Key) Certificate
Following are several tips on how to avoid social engineering schemes. These steps won’t prevent your account from getting compromised if a service provider falls for a social engineering hack and hands your account over to