Social Engineering: What is Whaling ?

whaling social engineering attack

A whaling attack is a social engineering technique involving scam emails imitating senior individual messages to target high-ranking executives. As such, it’s a form of executive phishing, like spear phishing. However, whaling specifically targets one high-profile employee. What is whaling? A whaling attack is a form of phishing attack usually using fraudulent emails which target […]

Information Warfare : How Does It Work And How To Protect Yourself

Information warfare, or infowar, aims to employ information and communication technologies (ICT) in order to harm an enemy country or organization. It is used by hackers, as well as by official governments. But did you know it can also be used against a specific company or person? What is information warfare ? Information warfare encompasses […]

Social Engineering: What is Tailgating?

tailgating

What is tailgating? Tailgating or piggybacking is a physical Social Engineering attack where a person seeks to enter a restricted area where they are otherwise not allowed to be. Basically, tailgating definition is when someone sneaks into a restricted area by using someone else.This can be by following someone real close carrying something and asking […]

What is cyber warfare and are you concerned?

The current conflict in Ukraine is accompanied behind the scenes by cyber warfare. For many, it signals a new era of cyber attacks. But what is cyber warfare? How does cyber war in Ukraine play out and what are its purposes? And above all, if we are also potentially concerned, how can we protect ourselves […]

Social Engineering: What is baiting?

What is baiting? “Congratulations! You won a prize!” If you ever saw a message like this, there is a 101% chance that it was a baiting attack. Baiting is like the real-world ‘Trojan Horse’in that it relies on the curiosity or greed of the victim. This is different from, say a quid pro quo attack […]

Mailfence supports humanitarian organizations in Ukraine

support icon

President Vladimir Putin launched a military assault against Ukraine to protect, he says, civilians in the breakaway republics of Donetsk and Luhansk. Countries across the globe have appealed to stop the invasion of Ukraine and have imposed the strongest sanctions ever against Russia. Despite this global condemnation, fighting goes on and civilian casualties increase. We […]

5 cyber threats that exploded in 2021 and why the pandemic is responsible

The coronavirus pandemic has turned the world upside down. We all had to change our routines and adapt to different ways of working in a matter of weeks. These changes have accelerated the rollout of some new technologies, and they have also spurred innovation and the development of new tools. Unfortunately, they have also created […]

Banning encryption: why is it a poor idea?

Last year, leaks from the Council of the European Union revealed that the European Union was (again) considering banning encryption. More recently, the Belgian government planned to enact an oppressive surveillance law. It wanted to force systems operators using end-to-end encryption to “disable” a particular user’s encryption upon request from the authorities. Fifty organizations and […]

Goodbye 2021, hello 2022

2022 calendar icon

Hello, As another year starts, we pause to reflect on what we’ve achieved in these challenging times and are happy to share with you some of our objectives for the year ahead. 2021 flew by and despite the challenging environment, we can look back at a great year with lots of developments and improvements as […]

Mailfence keeps on improving security for its users

mailfence secure and private email service

Security is one of our core priority, with privacy. We work hard to provide our users the most secure and private experience when using Mailfence. Many users, such as journalists or dissidents use our service for sensitive communications. They are often targeted by advanced persistent threats. Over the past years, we released several new features […]