Top 5 Ways To Prevent Ransomware Attacks
Ransomware is software developed to scramble infected computer systems, computers, tablets, or smartphones screen content or files so that data become unreadable. Hackers can then claim a ransom to unlock...
Welcome to the Crook archives of the Mailfence Blog.
Ransomware is software developed to scramble infected computer systems, computers, tablets, or smartphones screen content or files so that data become unreadable. Hackers can then claim a ransom to unlock...
“Zombie” is the term used when an attacker takes control of your computer without your knowledge. A zombie attack aimed either to steal your sensitive information or to make...
Think your email account may have been hacked? Most of us use email so often and from so many machines that it might be hacked one day. But don’t panic....
Vishing is a combination of “voice” and “phishing”. It refers to phishing scams done over the phone. Individuals are tricked into revealing critical financial or personal information during seemingly trustworthy...
Quid pro quo is a kind of social engineering attack where a hacker promises a profit in exchange for information that can later be used to steal money, data, or...
Today’s advanced malware tools often comprise several different components. They are more like Swiss army knives rather than individual tools. This gives an attacker the ability to perform a number...
Plus addressing (or sub-addressing) allow you to use different versions of your email address. A great thing is to use plus addressing to track spammers. Use it whenever you want...
Yahoo recently confirmed a massive breach of over 500 million email accounts, including both credentials and security questions. At Mailfence – a secure and private email service, the security team...
Recently a GNU/Linux TCP vulnerability was disclosed (CVE-2016-5696) by security researchers in the US. Upon analysis, this bug did not pose a threat to our users. Nevertheless, we have already taken...