
Top 5 Bad Password Habits
Less than 1 second : that’s how long it will take for a fairly savvy hacker to crack the password “qazwsxedc”. So, more than ever, you need to avoid bad password habits to secure all your
Encryption is the answer.
Less than 1 second : that’s how long it will take for a fairly savvy hacker to crack the password “qazwsxedc”. So, more than ever, you need to avoid bad password habits to secure all your
Since the start of the Covid-19 pandemic, the number of cyber attacks on organizations and individuals has exploded. It is therefore more important than ever to keep your data and your privacy online safe. Here
How well do you remember your passwords? If you’re like most people, you probably keep forgetting passwords. You might be guilty of reusing the same password on different accounts, or creating weak passwords. In this
Information warfare, or Infowars, aims to employ information and communication technologies (ICT) in order to harm an enemy country or organization. What is information warfare ? Information warfare encompasses several techniques: Let’s focus on the
The current conflict in Ukraine is accompanied behind the scenes by cyber warfare. For many, it signals a new era of cyber attacks. But what is cyber warfare? How does cyber war in Ukraine play
The coronavirus pandemic has turned the world upside down. We all had to change our routines and adapt to different ways of working in a matter of weeks. These changes have accelerated the rollout of
Last year, leaks from the Council of the European Union revealed that the European Union was (again) considering banning encryption. More recently, the Belgian government planned to enact an oppressive surveillance law. It wanted to
Security is one of our core priority, with privacy. We work hard to provide our users the most secure and private experience when using Mailfence. Many users, such as journalists or dissidents use our service
If you have read our posts related to social engineering plots (phishing, smishing, whaling and vishing), you already know that many kinds of scams are derived from phishing. But it’s important to learn about the