White keyboard with woman's fingers typing

Security

All articles tagged "Security"

Account registration: What can happen if I enter false information?

When you signed up for your mail.com account, you might have asked yourself why we asked for your postal address. Are they going to send me advertising by snail mail? Give my address to third parties? Of course not! There’s a simple explanation, and it has to do with security more
123 people found this article helpful.

What is SMTP? And how does SMTP authentication help fight spam?

Whenever you send an email, the process would not be possible without the SMTP protocol. It’s used by mail servers to relay outgoing email messages from the senders and to the recipients. Unfortunately, spammers started abusing a loophole in the protocol – until SMTP authentication put a stop to this trick. more
157 people found this article helpful.

Who invented passwords? History and future of the password

Ever wondered when people started using passwords? It may not surprise you to hear that the ancient Romans had military passcodes, but did you know that they make an appearance in the Hebrew Bible as well? more
18 people found this article helpful.

Email spoofing: Definition and how spoofing works

A friend tells you they’ve received a strange email from your address, but there’s no sign of suspicious emails in your sent mail folder. Your caller ID shows a number you recognize, but there’s a strange voice on the other end of the line. Both of these are examples of spoofing, or communications under a faked name. more
30 people found this article helpful.

Inactive accounts: What can happen to unused email addresses?

A lot of people have a “junk” email address or an old account they rarely log in to. But did you know that unused accounts can risk your online security and your data, and that inactive email accounts can “expire”? Explore your options for inactive email addresses. more
90 people found this article helpful.

I have 2FA enabled, but it’s not working. What should I do?

If you are like a lot of our users, you appreciate the extra security that 2FA gives your email account by requiring a second verification step at login. But what do you do if something goes wrong – like if you no longer have access to the “second factor” because of a problem with the device you use for authentication? Don’t panic – we will get through this together. more
21 people found this article helpful.

How to wipe a hard drive so your data is truly erased

You’ve just purchased a shiny new laptop, and now you’d like to donate your old computer, give it to a family member, or recycle the hardware. We applaud your sustainable choices! But wait – have you deleted all the data on your hard drive? Is it really, truly gone? Or can whomever gets your old device recover any of it? more
27 people found this article helpful.

Protect your email app with fingerprint or facial recognition

If you use the mail.com Mail App on your iOS or Android mobile device, you may want to protect your account against unauthorized access without having to completely log in and out each time you check your email or use your cloud. So why not enable biometric authentication? It only takes a few taps! more
26 people found this article helpful.

How secure is my password?

“Better safe than sorry” may be an old saying, but when it comes to your email password, it definitely still holds true. Because if an unauthorized person gains access to your email account, it can have serious consequences. So what are best practices for a strong password? more
139 people found this article helpful.

Malware types: Do you know the true meaning of malware?

Feeling cybersecure? Ever stared at the computer screen hoping a malware attack was just some horrible practical joke? If you are like the rest of us and have experienced this moment, then don’t worry we’ve got your back. If you have never experienced this situation, we’ve also got your back. We will give you the know-how to keep yourself and devices secure from malware. more
94 people found this article helpful.