Mailfence Blog

Privacy is a right, not a feature!

Mailfence Encryption Methods

Symmetric vs Asymmetric Encryption: What’s the difference?

In this blog post, we explain the major differences between symmetric vs asymmetric encryption. This article will also explain which encryption method you should use. Some words about different encryption...

Social Engineering Phishing

Social Engineering: What is Phishing?

Phishing is the most well-known social engineering attack, where a cyberattacker pretends to be a reliable source to make their victims reveal their personal information or download malware. According to...

What is shoulder spoofing

Social Engineering: What is Shoulder Surfing?

Shoulder surfing is the practice of stealing sensitive information by looking over another person’s shoulder while they are keying that information into the device. What is Shoulder Surfing? You’re on...

How to stop email spoofing

What is Email Spoofing and How to Spot it?

Email spoofing is a cyberattack in which a malicious actor impersonates a legitimate sender. They hide their identity by sending an email from a fake email address. They trick you...