Protect Your Data When Crossing Borders
Anyone who has travelled to the United States will know how seriously border security is taken. In recent years, Customs & Border Protection (CBP) agents have been increasingly searching travellers’...
Welcome to the Security archives of the Mailfence Blog.
Anyone who has travelled to the United States will know how seriously border security is taken. In recent years, Customs & Border Protection (CBP) agents have been increasingly searching travellers’...
In the digital age, where most of our communications are online, email remains one of the primary methods we use for professional and personal correspondence. However, with rising concerns about...
What is end-to-end encryption? End-to-end encryption is a method of securely transmitting data in a way that only the sender and recipient can read the actual message by encrypting it on the...
Shoulder surfing is the practice of stealing sensitive information by looking over another person’s shoulder while they are keying that information into the device. What is Shoulder Surfing? You’re on...
If you’re like most people, you probably don’t know much about social engineering. Or you believe it only aims to dupe unsuspecting victims to steal some money. But what you...
Email spoofing is a cyberattack in which a malicious actor impersonates a legitimate sender. They hide their identity by sending an email from a fake email address. They trick you...
Ever since Snowden’s revelations, we’re all aware our digital data are not safe by default. The risk is not limited to states and governments. In particular, other companies may want...
Mailfence offers a secure and private collaborative suite, and all user accounts are protected through standard security and privacy measures (check our high-level security analysis for more information). However, as...
Security, privacy, and anonymity are three concepts crucial to Mailfence. Our email suite has been designed to take all three into account, making it a unique solution. We also believe...
Why do hackers target SMEs? Cybercriminals indeed attack them more often than large companies. Read this article and find out why pirates target small businesses, and, more importantly, how to...
Scareware is a social engineering technique that aims to scare the victim into believing they have a virus on their device and should buy or download specific software. As many...