Network of lights in hands on sunset background

Security

All articles tagged "Security"

Spamhaus, bounced emails and blocked IP addresses

Your email bounces back with a permanent error “A message that you sent could not be delivered to one or more of its recipients.”
Open laptop on desk with email icons on screen and floating email icons in air around it
Check the bounce message to see if you are on an spam blocklist
When you look in at the bounce message closely, you see it’s been blocked by “Spamhaus.” What’s that all about? more
10 people found this article helpful.

The best password managers

Why use a password manager? It can be hard to come up with and remember unique and secure passwords for all the websites we use nowadays. But as soon as we get lazy – using the same password on multiple sites or a weak password like Password123 – we leave our data vulnerable to hackers and other cyber criminals.
Symbols for password lock and online services over image of man’s hands holding and using a tablet computer
Password managers help you keep track of the strong passwords needed to keep your data safe
One solution is to use a password manager.
  more
5 people found this article helpful.

What is spear phishing? Can you prevent it?

Phishing scams – where you receive fraudulent messages pretending to be from a trusted sender designed to trick you into revealing personal data – have unfortunately become widespread and the criminals behind them have refined their techniques. For example, there are phishing phone calls (called “vishing” for voice-phishing) and phishing text messages (“smishing” for SMS-phishing).
Several padlocks and combination locks caught on a fishing hook
Protect yourself against scammers who are phishing for your password
And there is “spear phishing,” a specific form of email phishing that targets individual users. more
7 people found this article helpful.

What can I do if I have a problem with 2FA?

If you are like a lot of our users, you appreciate the extra security that 2FA gives your email account by requiring a second verification step at login. But what do you do if something goes wrong – like if you no longer have access to the “second factor” because of a problem with the device you use for authentication?
Man eating breakfast while using digital tablet and phone
Problems with 2FA? Your secret key will soon have you smiling again!
Don’t panic – it’s time to use your secret key. more

Posted in

2FA Security Password
9 people found this article helpful.

Americans see data disclosure by internet companies or authorities as one of biggest threats to data security

  • Majority of U.S. Americans concerned about hacker attacks
  • A quarter worry about burglary and damage to homes
  • Dangerous lack of awareness: More than one in ten respond to spam emails
more
6 people found this article helpful.

What is ransomware?

Red-on-black image of locked computer screen against a background of binary code
Do you know how to recognize and protect yourself against ransomware?
You may have seen headlines about ransomware attacks on institutions ranging from banks to hospitals to gas-pipelines. But what is ransomware, why is it dangerous, and can such attacks be prevented? Today, we answer your questions about ransomware. more
9 people found this article helpful.

Ask the Expert: Secure passwords

Notice board with lots of notes tacked up including one with a password
What password security mistakes can you spot in this picture?
Welcome to our first ever “Ask the Expert” post! We’re joined by our email security expert Arne for a deep dive into the topic of passwords and online security. In an interview, he shares some do’s and don’ts about passwords and clears up some common misconceptions. more
27 people found this article helpful.

How do I know if my email has been hacked?

Person wearing hoodie types on laptop while looking at screen with the words Hacker Attack

What happens if your email has been hacked?

How do you know if your email has been hacked or comprised? And if it happens, how can you block cybercriminals and regain control of your account? Discover the most common signs of a hacker attack and what to do about them. more

Posted in

Email Inbox Security
39 people found this article helpful.

Phishing emails: How to protect yourself

Image of fishhook hooking an @ symbol above a white computer keyboard

Be on the alert for phishing scams that aim to hook your personal information

You have probably heard about phishing scams – fraudulent emails designed to rob you of sensitive data. Because phishing is one of the most widespread forms of cybercrime, it’s important to learn how to recognize these scams so you don’t get caught in the net. more

Posted in

Phishing Security Spam
43 people found this article helpful.

Checklist: your personal mail.com settings

Man typing on computer keyboard with word "Password?" appearing over his head
Forgot your password? Saved contact information speeds up the password recovery process
Is your email account as secure as it can be? You can help keep things safe through your personal settings. The personal data associated with your mail.com account can be found on the Home page of your mailbox under "My Account." This is where you go to enter a cell phone number so you can quickly recover your password. Or change your password if you think the old one is no longer secure. But there are a few more things you can do to boost the security of your email. Let’s take a look – we promise, it will only take a few minutes, and it could save you a lot of trouble down the road. more

Posted in

Inbox Security Password
52 people found this article helpful.