Inactive accounts: What can happen to unused email addresses?

Suppose your mail.com email account is your primary email address, but you still have one from your college days that you rarely log in to. Or you mostly communicate by text message, so you have an email address for when you need to register for various online services, but you don’t really check it otherwise. Many of us have such dormant accounts and don’t give them much thought.
Close-up of hourglass in front of businessperson working in office
Make sure time doesn’t run out on an inactive email account
But an inactive email address could put you at risk – either of losing data and messages in the account, or of becoming an easy target for hackers. more
22 people found this article helpful.

Business email etiquette: 10 best practices for professional emails

From professional greetings in email to a choosing the right closing, proper email etiquette for business can be tricky. And given the many messages we write, read and reply to every day, it can be easy to make an embarrassing mistake. But it pays to make an effort: Professional email etiquette can help you succeed in your career by showing respect and appreciation in your communications.
Professional woman sits on bench smiling and holding laptop
Email professionalism means using proper email etiquette
mail.com shares 10 of the best practices for email professionalism. more
27 people found this article helpful.

Never forget a birthday again: Use calendars and reminders

Everybody likes to be remembered on their birthdays – in many cultures, it is an important celebration that makes the birthday boy or girl feel special and appreciated. So it can also be very embarrassing to forget a birthday. But with so many friends, relatives and coworkers to keep track of, it’s easy to drop the ball on someone’s big day.
Group of coworkers at office birthday party
Use a birthday calendar – paper or digital – to make sure you never miss the fun!
Our advice: Learn the birthdays of your immediate family by heart, and use these tools to remember the rest! more
3 people found this article helpful.

What is typosquatting?

Fraudulent websites are a common example of a cybersecurity risk. Cybercriminals mimic the sites of trusted businesses to phish for visitors’ personal data or spread malware. One tool in their arsenal is typosquatting, where they buy domain names that are intentional misspellings of popular websites.
Two women dressed in black in dark warehouse room working on computer with two screens
Typosquatting turns simple typos into a tool for cybercrime
But how can a simple typo leave you vulnerable to online scams? more
11 people found this article helpful.

Should I request read receipts for my emails?

Are you sending an important email and want to make sure that the recipient actually opened – and read – it? One way to make sure is by requesting a read receipt. Unfortunately, some people do not like receiving them and will not respond.
Frowning, bearded man with hand on chin holding smartphone and looking at laptop
If you’re worried that your email won’t be read on time, is a read receipt the answer?
Learn how and when to request a read receipt, and your alternatives for getting an email confirmation. more
17 people found this article helpful.

What is a QR code? And why are they suddenly everywhere?

QR codes seem to be everywhere you look nowadays. You see these “square barcodes” on ads and museum exhibits, packages and Wi-Fi access points. Even if you had never noticed them before the coronavirus pandemic, they seem to be everywhere now, playing a key role in exposure tracing in many locations. They also let us access information like restaurant menus without having to touch the surface of any object but our own mobile device.
Corner of mobile device with screen displaying part of a QR code
It’s easy to read a QR code – or create your own!
However, QR codes have been around for more than 25 years. Find out more, including how to create a QR code. more
17 people found this article helpful.

Happy birthday, email!

This year marks the 50th anniversary of email, a technology that has transformed the way the world communicates. From the first-ever message “QWERTYUIOP” to forming the backbone of today’s digital services, email has come a long way. more
8 people found this article helpful.

What is 5G? Answers to your questions about 5G technology

It seems like 5G is everywhere now – from ads for cellular carriers and new smartphones to reports of potential dangers of this new technology. But what is 5G and how will it affect you?
Woman's hands holding smartphone with 5G symbols above it
What does 5G technology mean for you?
mail.com offers some quick facts about 5G technology.
  more
9 people found this article helpful.

THE CAPS LOCK KEY: Why is it there and how to reverse it

DID YOU KNOW THAT OCTOBER 22 IS CAPS LOCK DAY!?  (Sorry, we’ll stop shouting now!) If you see social media posts written entirely in capital letters on October 22nd, you should know that it’s because Derek Arnold created this (presumably ironic?) “holiday” in 2000 to call attention to the misuse of this button on our computer keyboards.
Photo of laptop keyboard showing caps lock key
Caps Lock occupies a prime position on your computer keyboard. But do you need it?
 So why is Caps Lock there, should you use it – and can you make it go away? more
8 people found this article helpful.

Spamhaus, bounced emails and blocked IP addresses

Your email bounces back with a permanent error “A message that you sent could not be delivered to one or more of its recipients.”
Open laptop on desk with email icons on screen and floating email icons in air around it
Check the bounce message to see if you are on an spam blocklist
When you look in at the bounce message closely, you see it’s been blocked by “Spamhaus.” What’s that all about? more
18 people found this article helpful.