What is cyber warfare and are you concerned?
The current conflict in Ukraine is accompanied behind the scenes by cyber warfare. For many, it signals a new era of cyber attacks. But what is cyber warfare? How does cyber war in Ukraine play
Encryption is the answer.
The current conflict in Ukraine is accompanied behind the scenes by cyber warfare. For many, it signals a new era of cyber attacks. But what is cyber warfare? How does cyber war in Ukraine play
The coronavirus pandemic has turned the world upside down. We all had to change our routines and adapt to different ways of working in a matter of weeks. These changes have accelerated the rollout of
Last year, leaks from the Council of the European Union revealed that the European Union was (again) considering banning encryption. More recently, the Belgian government planned to enact an oppressive surveillance law. It wanted to
Security is one of our core priority, with privacy. We work hard to provide our users the most secure and private experience when using Mailfence. Many users, such as journalists or dissidents use our service
If you have read our posts related to social engineering plots (phishing, smishing, whaling and vishing), you already know that many kinds of scams are derived from phishing. But it’s important to learn about the
It is been more than a month now since Microsoft first acknowledged a data breach on its on-premises Microsoft Exchange Server. Attackers were able to get administrator privileges on affected servers, access to user emails
We have taken many steps to protect our users from common attacks such as spoofing or phishing. However, such emails might still find their way to your inbox. While we do…
TLS is a protocol that encrypts traffic between a client program and the server. It also ensures that the software client is talking to the right server. Protocols are continuously being improved through the release
DISCLAIMER: This is not an attack on Countermail. This is a comparison between two encrypted email providers that take two similar approaches to privacy but offer different services and features. Finally, we plan on doing