Category: Tips

Welcome to the Tips archives of the Mailfence Blog.

What distinguishes instant messaging from email

What distinguishes instant messaging from email?

Obsolete, outdated, and even “dead”: with the rise of instant messaging applications, many media are predicting the demise of email. Email is considered time-consuming, stressful and is no longer part...

Email Security: 10 best practices to rock 2022

Do you need email security?   Email has become an indispensable tool to communicate for many people. The shared data might be confidential, or not, but you have a right to...

Learn to distinguish spear phishing

Spear phishing: What is it and how to prevent it

If you have read our posts related to social ingineering ploys (phishing, smishing, whaling and vishing), you already know that many kinds of scams are derived from phishing. But it’s...

Mailfence Jabber chat is a secure chat service

Mailfence Jabber Chat: use a secure group chat

Mailfence strives to make the internet a safer place. We offer a secure ecosystem to help you organize your life and your work through powerful productivity tools such as Mailfence...

degoogle (ou degooglify) com nossas dicas

How to degoogle your life

Google tracks you every time you use their services and there are tons of Google services. No doubt you are using several of Google products because they are free. However...

Social Ingeneering tips : what is whaling

Social Engineering: What is a whaling attack?

A whaling attack is a form of phishing attack aimed at high-profile executives. By impersonating a highly-ranked professional, cybercriminals try to trick their victims into doing unfavourable actions. They usually...

Social Engineering: What is Phishing?

Phishing (pronounced “fishing”) is a kind of identity theft that is growing in popularity amongst hackers. By using fraudulent websites and false emails, fake phone calls, and whatnot – perpetrators attempt...

Definition of Pretexting and examples

WHAT IS PRETEXTING?  Pretexting is another form of social engineering where attackers focus on creating a good pretext, or a fabricated scenario, that they can use to try stealing their...