Tagged: Access

Welcome to the Access archives of the Mailfence Blog.

Hacked email

Steps To Take When Your Email Is Hacked

Think your email account may have been hacked? Most of us use email so often and from so many machines that it might be hacked one day. But don’t panic....

Why use a virtual machine

Virtual Machine: What Is It And Why Use It?

A virtual machine is another practical method to improve your security and privacy by protecting your device (computer, server) from many cyber threats, preventing it from getting compromised. But don’t...

SSL certificate KB

Mailfence knowledge base: SSL/TLS certificate

This blog post provides details over the SSL/TLS certificate for the Mailfence knowledge base (KB). A modern browser should automatically check the validity of the Mailfence KB SSL/TLS certificate and...

Protect devices travelling

Tips To Protect Your Devices When Travelling

Our smartphones, computers, tablets, and other electronic gadgets are so much a part of our daily lives that it is now inconceivable not to take them with us when travelling...

what is vishing

Social Engineering: What is Vishing?

Vishing is a combination of “voice” and “phishing”. It refers to phishing scams done over the phone. Individuals are tricked into revealing critical financial or personal information during seemingly trustworthy...

what is smishing

Social Engineering: What is Smishing?

Smishing is a social engineering attack using phishing techniques, but sent by text message instead of email. The name is a combination of SMS and phishing. In this post, you’ll...

How companies should protect their data from spying

How companies should protect their data from spying

After the revelations of former CIA and NSA affiliated individual ‘Edward Snowden’ regarding PRISM, the gigantic spying program of the American government, users – individuals and organizations – have realized the...

Social Engineering: What is Phishing?

Phishing (pronounced “fishing”) is a kind of identity theft that is growing in popularity amongst hackers. By using fraudulent websites and false emails, fake phone calls, and whatnot – perpetrators attempt...