
What is cyber warfare and are you concerned?
The current conflict in Ukraine is accompanied behind the scenes by cyber warfare. For many, it signals a new era of cyber attacks. But what is cyber warfare? How does cyber war in Ukraine play
Encryption is the answer.

The current conflict in Ukraine is accompanied behind the scenes by cyber warfare. For many, it signals a new era of cyber attacks. But what is cyber warfare? How does cyber war in Ukraine play

The coronavirus pandemic has turned the world upside down. We all had to change our routines and adapt to different ways of working in a matter of weeks. These changes have accelerated the rollout of

Last year, leaks from the Council of the European Union revealed that the European Union was (again) considering banning encryption. More recently, the Belgian government planned to enact an oppressive surveillance law. It wanted to

Security is one of our core priority, with privacy. We work hard to provide our users the most secure and private experience when using Mailfence. Many users, such as journalists or dissidents use our service

If you have read our posts related to social engineering plots (phishing, smishing, whaling and vishing), you already know that many kinds of scams are derived from phishing. But it’s important to learn about the

It is been more than a month now since Microsoft first acknowledged a data breach on its on-premises Microsoft Exchange Server. Attackers were able to get administrator privileges on affected servers, access to user emails

We have taken many steps to protect our users from common attacks such as spoofing or phishing. However, such emails might still find their way to your inbox. While we do…

TLS is a protocol that encrypts traffic between a client program and the server. It also ensures that the software client is talking to the right server. Protocols are continuously being improved through the release

DISCLAIMER: This is not an attack on Countermail. This is a comparison between two encrypted email providers that take two similar approaches to privacy but offer different services and features. Finally, we plan on doing