Tagged: Access

Mailfence accepts bitcoins

Bitcoins are taking over the crypto-currency marketplace and are one of the best ways to preserve one’s privacy. They’re now the largest and most well-known digital currency. As one of...

Transparency Report and Warrant Canary

In light of our attachment to online privacy – we would like to present our Transparency report and Warrant canary in order to inform you about legal requests for information...

Social Engineering: What is Phishing?

      Phishing (pronounced “fishing”) is a kind of identity theft which is growing in popularity amongst hackers. By using fraudulent websites and false emails, fake phone calls and whatnot...

11 tips on how to avoid social engineering schemes

Following are several tips on how to avoid social engineering schemes. These steps won’t prevent your account from getting compromised if a service provider falls for a social engineering hack and...

La NSA et l'espionnage sur Facebook

When the NSA bugs Facebook spying

Glenn Greenwald, a political journalist, lawyer and blogger, worked with Edward Snowden on the revelations about the surveillance program of the American National Security Agency (NSA). He is the one...

protéger les données

Why companies should protect data from spying

After the revelations of former CIA and NSA affiliated individual ‘Edward Snowden’ regarding PRISM, the gigantic spying program of the American government, users have realized the danger against their digital data....