account takeover protection
Privacy
Security

Social Engineering, concrete examples and how to defend yourself

In the previous post, we introduced the concept of social engineering, exploring how this technique organizes itself, studies its victims, and attacks them. We concluded that the best defense strategy is knowledge. In this new article, we will put these...

Privacy
Security

Social Engineering, the cyber attack exploiting human weakness

Social engineering is a cunning technique that exploits human weaknesses to carry out attacks and obtain sensitive information for fraudulent purposes. There is no antivirus that can fully protect you from this threat. This technique relies on manipulating people through...

SPF-DKIM-DMARC email scan
Security

How to verify and update your SPF, DKIM and DMARC records

SPF, DKIM and DMARC represent a valid help to prevent your domain from being used for Email Spoofing attacks, i.e. sending messages with a fake sender. They are also useful for improving domain reputation and email deliverability rates. The attacks...

ransomware attack
Security

Ransomware attack: how it spreads and how to protect yourself

Cyber attacks are growing in quantity and severity As stated in the Clusit 2022 Report, 2021 was the worst year ever recorded. Overall, the world's serious cyber attacks increased by 10% compared to the previous year. Of the attacks detected,...

News
Qboxmail
Security
Solutions

Daily email backup with Mail Time Machine

Have you ever despaired for accidentally deleting one or more messages from your mailbox? How did it go? Were you able to recover them quickly and easily? With Qboxmail, you no longer have to worry about losing precious information. Thanks...

News
Security
Solutions

Password theft: a new monitoring system to protect your mailbox

Malware that infect computers tend to steal the login credentials of webmail users more and more often. These credentials are then used to send other emails containing spam or viruses through their providers' SMTP servers. Password theft does not stop...

We use cookies to provide you a better browsing experience, by continuing you accept their use. For more information visit the Privacy policy page.

Accept