White keyboard with woman's fingers typing

Security

All articles tagged "Security"

How hackers steal passwords - and ways you can protect yours

From sophisticated programs to simple guesswork, there are many ways hackers steal passwords. No matter how your password lands in the hands of a cybercriminal, a hacked email account can be a real headache with often unforeseen consequences. Discover how to protect yourself from the most common methods of password theft. more
321 people found this article helpful.

Blocked by Spamhaus: Bounced emails and blocked IP addresses

Your email bounces back with a permanent error: “A message that you sent could not be delivered to one or more of its recipients.” When you look at the bounce message closely, you see it’s been blocked by “Spamhaus.” What’s that all about? more
282 people found this article helpful.

Account registration: What can happen if I enter false information?

When you signed up for your mail.com account, you might have asked yourself why we asked for your postal address. Are they going to send me advertising by snail mail? Give my address to third parties? Of course not! There’s a simple explanation, and it has to do with security more
169 people found this article helpful.

What is SMTP? And how does SMTP authentication help fight spam?

Whenever you send an email, the process would not be possible without the SMTP protocol. It’s used by mail servers to relay outgoing email messages from the senders and to the recipients. Unfortunately, spammers started abusing a loophole in the protocol – until SMTP authentication put a stop to this trick. more
242 people found this article helpful.

Who invented passwords? History and future of the password

Ever wondered when people started using passwords? It may not surprise you to hear that the ancient Romans had military passcodes, but did you know that they make an appearance in the Hebrew Bible as well? more
148 people found this article helpful.

Email spoofing: Definition and how spoofing works

A friend tells you they’ve received a strange email from your address, but there’s no sign of suspicious emails in your sent mail folder. Your caller ID shows a number you recognize, but there’s a strange voice on the other end of the line. Both of these are examples of spoofing, or communications under a faked name. more
50 people found this article helpful.

Unused emails: What happens to inactive accounts?

A lot of people have a “junk” email address or an old account they rarely log in to. But did you know that unused accounts can risk your online security and your data, and that inactive email accounts can “expire”? Explore your options for inactive email addresses. more
233 people found this article helpful.

2FA not working? Use the 2FA secret key to restore access

If you are like a lot of our users, you appreciate the extra security that 2FA gives your email account by requiring a second verification step at login. But what do you do if something goes wrong – like if you no longer have access to the “second factor” because of a problem with the device you use for authentication? Don’t panic – we will get through this together. more
141 people found this article helpful.

How to wipe a hard drive so your data is truly erased

You’ve just purchased a shiny new laptop, and now you’d like to donate your old computer, give it to a family member, or recycle the hardware. We applaud your sustainable choices! But wait – have you deleted all the data on your hard drive? Is it really, truly gone? Or can whomever gets your old device recover any of it? more
58 people found this article helpful.

Protect your email app with fingerprint or facial recognition

If you use the mail.com Mail App on your iOS or Android mobile device, you may want to protect your account against unauthorized access without having to completely log in and out each time you check your email or use your cloud. So why not enable biometric authentication? It only takes a few taps! more
1,070 people found this article helpful.