Reclaim Your Privacy.
Welcome to the Mailfence blog.
Mailfence News

Mailfence Release Notes April 2021
We’re happy to present the Mailfence Release Notes April 2021 with several improvements, and fixes. New Features Improvements Mobile screen app (PWA) Extra notes regarding

European Tech companies warn of lowering data protection levels in the EU
In an attempt to fight child abuse, the EU is planning to ban encryption. Consequently, all communications would go through screening to identify potential cases

Analysis of the Microsoft Exchange Server hack
It is been more than a month now since Microsoft first acknowledged a data breach on its on-premises Microsoft Exchange Server. Attackers were able to
Get the latest privacy news in your inbox
Email Security

Social Engineering Attacks: How to Detect and Avoid Them?
If you’re like most people, you probably don’t know much about social engineering attacks. Or do you believe it only aims to dupe unsuspecting victims

What is WKD? Everything You Need to Know About Web Key Directory
What is WKD? The Web Key Directory (WKD) is a protocol that simplifies the retrieval of OpenPGP public encryption keys linked to email addresses. By

Data Backup: 5 Tips So You Never Loose Your Data (2025 Update)
Your data—whether it’s personal photos, essential business files, or financial records—holds immense value. Yet, countless people underestimate how vulnerable their information is until it’s too
Online Privacy

Why You Need A Private Email Service Now
You probably know someone or have heard a really scary case of hacking or scamming. What you probably do not know however is that more

20+ Common Privacy Threats You Should Keep an Eye on to Protect Your Sensitive Data
Online privacy threats have become much more diverse and sophisticated than they were 10 or even 5 years ago and cybercriminals are getting more and

Encrypt email with Gmail and Outlook.com or any other provider
Mailfence is an end-to-end encrypted email solution with digital signatures that gives users full freedom and control over their key management. However, how to encrypt