White keyboard with woman's fingers typing

Security

All articles tagged "Security"

How to choose the best password manager for you

Why use a password manager? It can be hard to come up with and remember unique and secure passwords for all the websites we use nowadays. But as soon as we get lazy – using the same password on multiple sites or a weak password like Password123 – we leave our data vulnerable to hackers and other cyber criminals. One solution is to use a password manager. more
265 people found this article helpful.

Eight easy ways to keep your phone & data safe when you travel

It seems impossible to imagine traveling without our phones these days. A smartphone lets us capture precious memories, keep in touch with our loved ones, and navigate strange cities. So picture what would happen if your phone was lost, damaged, or stolen in the middle of your trip. more
509 people found this article helpful.

Is this URL safe? How to check if a link you received is dangerous

“Check out this funny video!” “Click here for savings!” It seems like almost every email we receive these days is just begging us to click on one or several links. But unsafe links can install malware on your device or lead you to fraudulent websites. So how do you know when a URL is safe to click? more
323 people found this article helpful.

Fake job offer emails: How to avoid job scams

Taking advantage of people’s desire for remote positions and more flexibility, fake job offer scams are on the rise. Given the current rise in layoffs, more job seekers may be vulnerable to such scams. But fake job offers don’t just lead to disappointment – they are usually ploys to steal the unsuspecting target’s money or even involve them in criminal behavior. more
98 people found this article helpful.

Email life hack: How multiple email addresses boost your security

If you’re like me, you use your email address in a lot of different ways and a lot of different places. Of course it’s needed to send and receive personal and business correspondence. An email address is also usually required when you register to use online services, from payment platforms to social media. more
181 people found this article helpful.

How hackers steal passwords - and ways you can protect yours

From sophisticated programs to simple guesswork, there are many ways hackers steal passwords. No matter how your password lands in the hands of a cybercriminal, a hacked email account can be a real headache with often unforeseen consequences. Discover how to protect yourself from the most common methods of password theft. more
335 people found this article helpful.

Blocked by Spamhaus: Bounced emails and blocked IP addresses

Your email bounces back with a permanent error: “A message that you sent could not be delivered to one or more of its recipients.” When you look at the bounce message closely, you see it’s been blocked by “Spamhaus.” What’s that all about? more
283 people found this article helpful.

Account registration: What can happen if I enter false information?

When you signed up for your mail.com account, you might have asked yourself why we asked for your postal address. Are they going to send me advertising by snail mail? Give my address to third parties? Of course not! There’s a simple explanation, and it has to do with security more
171 people found this article helpful.

What is SMTP? And how does SMTP authentication help fight spam?

Whenever you send an email, the process would not be possible without the SMTP protocol. It’s used by mail servers to relay outgoing email messages from the senders and to the recipients. Unfortunately, spammers started abusing a loophole in the protocol – until SMTP authentication put a stop to this trick. more
257 people found this article helpful.

Email spoofing: Definition and how spoofing works

A friend tells you they’ve received a strange email from your address, but there’s no sign of suspicious emails in your sent mail folder. Your caller ID shows a number you recognize, but there’s a strange voice on the other end of the line. Both of these are examples of spoofing, or communications under a faked name. more
65 people found this article helpful.