Tagged: Trojan Horse

Welcome to the Trojan Horse archives of the Mailfence Blog.

Prevent ransomware attacks

Top 5 Ways To Prevent Ransomware Attacks

Ransomware is software developed to scramble infected computer systems, computers, tablets, or smartphones screen content or files so that data become unreadable. Hackers can then claim a ransom to unlock...

How to prevent your computer from becoming a zombie

What Is A Zombie Computer And How To Prevent It?

“Zombie” is the term used when an attacker takes control of your computer without your knowledge. A zombie attack aimed either to steal your sensitive information or to make your...

Hacked email

Steps To Take When Your Email Is Hacked

Think your email account may have been hacked? Most of us use email so often and from so many machines that it might be hacked one day. But don’t panic....

Social Engineering: What is Phishing?

Phishing (pronounced “fishing”) is a kind of identity theft that is growing in popularity amongst hackers. By using fraudulent websites and false emails, fake phone calls, and whatnot – perpetrators attempt...

Email security and privacy course

Email security and privacy awareness course

To mark the end of the year, we thought it is useful to propose email security and privacy course to enrich the learning and awareness of our users. For that...

How to combat Advanced Persistent Threats

The diluted usage of the term advanced persistent threat (APT) across the media, marketing and industry conversations continues to amaze us. Too many organizations are now distracted by the hype...

11 tips on how to avoid social engineering schemes

Following are several tips on how to avoid social engineering schemes. These steps won’t prevent your account from getting compromised if a service provider falls for a social engineering hack and...