Email spoofing: Definition and how spoofing works
A friend tells you they’ve received a strange email from your address, but there’s no sign of suspicious emails in your sent mail folder. Your caller ID shows a number you recognize, but there’s a strange voice on the other end of the line. Both of these are examples of spoofing, or communications under a faked name.
more
65 people found this article helpful.
Unused emails: What happens to inactive accounts?
A lot of people have a “junk” email address or an old account they rarely log in to. But did you know that unused accounts can risk your online security and your data, and that inactive email accounts can “expire”? Explore your options for inactive email addresses.
more
258 people found this article helpful.
What is a mailer daemon – and why did my email bounce back?
It’s the dreaded bounce message: “Mail delivery failed: returning message to sender.” If you receive it, it means something went wrong and your email never made it to the intended recipient. But why can’t some emails be delivered, and who is the mysterious “mailer daemon” who sends them back to you?
more
1,016 people found this article helpful.
Malware types: Do you know the true meaning of malware?
Feeling cybersecure? Ever stared at the computer screen hoping a malware attack was just some horrible practical joke? If you are like the rest of us and have experienced this moment, then don’t worry we’ve got your back. If you have never experienced this situation, we’ve also got your back. We will give you the know-how to keep yourself and devices secure from malware.
more
2,382 people found this article helpful.
How to report a phishing mail & more: Answers to reader questions
You asked, we answer! From where to find the spellcheck to how to report a phishing email, here are the answers to frequent questions we receive from our loyal readers and mail.com customers.
more
111 people found this article helpful.
Beware of phishing emails: New risks in 2022
Have you recently gotten an email asking you to enter your mail.com password or your account will be deactivated? Or received a request to log in to consent to changes in a company’s terms of use? Warning: These messages are examples of a kind of email scam known as “phishing”.
Because there are a lot of phishing mails circulating these days, here’s a refresher in how to protect yourself.
more
391 people found this article helpful.
Ransomware attacks: How you can recognize and prevent ransomware
You may have seen headlines about ransomware attacks on institutions ranging from banks to hospitals to gas-pipelines. But what is ransomware, why is it dangerous, and can such attacks be prevented? Today, we answer your questions about ransomware.
more
163 people found this article helpful.
Phishing emails: How to protect yourself
You have probably heard about phishing scams – fraudulent emails designed to rob you of sensitive data. Because phishing is one of the most widespread forms of cybercrime, it’s important to learn how to recognize these scams so you don’t get caught in the net.
more
426 people found this article helpful.
Black Friday: mail.com provides more protection against phishing with DMARC security standard
The email provider mail.com is now using the international security standard DMARC (Domain-based Message Authentication, Reporting and Conformance). This improves the protection of its users against fraud emails with forged sender addresses.
more
123 people found this article helpful.