White keyboard with woman's fingers typing

Security

All articles tagged "Security"

Eight easy ways to keep your phone & data safe when you travel

It seems impossible to imagine traveling without our phones these days. A smartphone lets us capture precious memories, keep in touch with our loved ones, and navigate strange cities. So picture what would happen if your phone was lost, damaged, or stolen in the middle of your trip. more
482 people found this article helpful.

Is this URL safe? How to check if a link you received is dangerous

“Check out this funny video!” “Click here for savings!” It seems like almost every email we receive these days is just begging us to click on one or several links. But unsafe links can install malware on your device or lead you to fraudulent websites. So how do you know when a URL is safe to click? more
314 people found this article helpful.

Fake job offer emails: How to avoid job scams

Taking advantage of people’s desire for remote positions and more flexibility, fake job offer scams are on the rise. Given the current rise in layoffs, more job seekers may be vulnerable to such scams. But fake job offers don’t just lead to disappointment – they are usually ploys to steal the unsuspecting target’s money or even involve them in criminal behavior. more
93 people found this article helpful.

Email life hack: How multiple email addresses boost your security

If you’re like me, you use your email address in a lot of different ways and a lot of different places. Of course it’s needed to send and receive personal and business correspondence. An email address is also usually required when you register to use online services, from payment platforms to social media. more
138 people found this article helpful.

How hackers steal passwords - and ways you can protect yours

From sophisticated programs to simple guesswork, there are many ways hackers steal passwords. No matter how your password lands in the hands of a cybercriminal, a hacked email account can be a real headache with often unforeseen consequences. Discover how to protect yourself from the most common methods of password theft. more
322 people found this article helpful.

Blocked by Spamhaus: Bounced emails and blocked IP addresses

Your email bounces back with a permanent error: “A message that you sent could not be delivered to one or more of its recipients.” When you look at the bounce message closely, you see it’s been blocked by “Spamhaus.” What’s that all about? more
282 people found this article helpful.

Account registration: What can happen if I enter false information?

When you signed up for your mail.com account, you might have asked yourself why we asked for your postal address. Are they going to send me advertising by snail mail? Give my address to third parties? Of course not! There’s a simple explanation, and it has to do with security more
169 people found this article helpful.

What is SMTP? And how does SMTP authentication help fight spam?

Whenever you send an email, the process would not be possible without the SMTP protocol. It’s used by mail servers to relay outgoing email messages from the senders and to the recipients. Unfortunately, spammers started abusing a loophole in the protocol – until SMTP authentication put a stop to this trick. more
242 people found this article helpful.

Who invented passwords? History and future of the password

Ever wondered when people started using passwords? It may not surprise you to hear that the ancient Romans had military passcodes, but did you know that they make an appearance in the Hebrew Bible as well? more
148 people found this article helpful.

Email spoofing: Definition and how spoofing works

A friend tells you they’ve received a strange email from your address, but there’s no sign of suspicious emails in your sent mail folder. Your caller ID shows a number you recognize, but there’s a strange voice on the other end of the line. Both of these are examples of spoofing, or communications under a faked name. more
50 people found this article helpful.