White keyboard with woman's fingers typing

Phishing

All articles tagged "Phishing"

How hackers steal passwords - and ways you can protect yours

From sophisticated programs to simple guesswork, there are many ways hackers steal passwords. No matter how your password lands in the hands of a cybercriminal, a hacked email account can be a real headache with often unforeseen consequences. Discover how to protect yourself from the most common methods of password theft. more
52 people found this article helpful.

Last minute holiday greetings: Should you send and open ecards?

Are ecards still a thing? They may seem like a relic belonging to the early days of the internet, but last year the New York Times reported a pandemic-related resurgence in ecards. Ecards are not just sent as email attachments anymore – there are also versions to send by text message or on social media platforms. more
249 people found this article helpful.

Black Friday: Up to 20 percent more spam

Black Friday is high season for internet bargain hunters. Wherever a lot of money is being spent online, however, cybercriminals are often not far behind. Email provider mail.com sees an increase in spam and phishing during the bargain holidays, with fake vouchers and shipping scams topping the list of scammers’ tricks. more
11 people found this article helpful.

Email spoofing: Definition and how spoofing works

A friend tells you they’ve received a strange email from your address, but there’s no sign of suspicious emails in your sent mail folder. Your caller ID shows a number you recognize, but there’s a strange voice on the other end of the line. Both of these are examples of spoofing, or communications under a faked name. more
34 people found this article helpful.

Inactive accounts: What can happen to unused email addresses?

A lot of people have a “junk” email address or an old account they rarely log in to. But did you know that unused accounts can risk your online security and your data, and that inactive email accounts can “expire”? Explore your options for inactive email addresses. more
104 people found this article helpful.

What is a mailer daemon – and why did my email bounce back?

It’s the dreaded bounce message: “Mail delivery failed: returning message to sender.” If you receive it, it means something went wrong and your email never made it to the intended recipient. But why can’t some emails be delivered, and who is the mysterious “mailer daemon” who sends them back to you? more
201 people found this article helpful.

Malware types: Do you know the true meaning of malware?

Feeling cybersecure? Ever stared at the computer screen hoping a malware attack was just some horrible practical joke? If you are like the rest of us and have experienced this moment, then don’t worry we’ve got your back. If you have never experienced this situation, we’ve also got your back. We will give you the know-how to keep yourself and devices secure from malware. more
94 people found this article helpful.

How to report a phishing mail & more: Answers to reader questions

You asked, we answer! From where to find the spellcheck to how to report a phishing email, here are the answers to frequent questions we receive from our loyal readers and mail.com customers. more
25 people found this article helpful.

Beware of phishing emails: New risks in 2022

Have you recently gotten an email asking you to enter your mail.com password or your account will be deactivated? Or received a request to log in to consent to changes in a company’s terms of use? Warning: These messages are examples of a kind of  email scam known as “phishing”.
Man in hoodie sits in office looking at laptop with serious expression on face
Not sure if an email is legit? Here's what you can look for.
Because there are a lot of phishing mails circulating these days, here’s a refresher in how to protect yourself. more
364 people found this article helpful.

What is pharming and how can you protect yourself?

Online scams can take many forms, but the aim is often the same: harvesting personal data, login credentials, and account information to commit identity theft. And pharming is no different.
Bearded man at desk holding credit card and looking at tablet computer
Pharming sites try to “harvest” information like your credit card number
Learn to recognize the signs of online fraud so you can protect yourself. more
47 people found this article helpful.