Tagged: Authentication

Welcome to the Authentication archives of the Mailfence Blog.

How to stop email spoofing

What is Email Spoofing and How to Spot it?

Email spoofing is a cyberattack in which a malicious actor impersonates a legitimate sender. They hide their identity by sending an email from a fake email address. They trick you...

Why use a virtual machine

Virtual Machine: What Is It And Why Use It?

A virtual machine is another practical method to improve your security and privacy by protecting your device (computer, server) from many cyber threats, preventing it from getting compromised. But don’t...

How to protect your data

12 Tips On How To Protect Your Data

Since the start of the Covid-19 pandemic, the number of cyber attacks on organizations and individuals has exploded. It is therefore more important than ever to keep your data and...

what is vishing

Social Engineering: What is Vishing?

Vishing is a combination of “voice” and “phishing”. It refers to phishing scams done over the phone. Individuals are tricked into revealing critical financial or personal information during seemingly trustworthy...

what is smishing

Social Engineering: What is Smishing?

Smishing is a social engineering attack using phishing techniques, but sent by text message instead of email. The name is a combination of SMS and phishing. In this post, you’ll...