Spam

How to identify phishing e-mails and protect your data

Identifying phishing e-mails: the telltale signs at a glance

Scammers send out dubious e-mails attempting to obtain sensitive data from internet users every day. This is known as phishing and isn’t just annoying; fraudulent e-mails cost millions each year as internet users fall victim to them. We reveal how to identify phishing e-mails and how to render your inbox harmless.

Sign e-mails with a digital signature

More security online: sign e-mails with a digital signature

Spam e-mails may be annoying, but they’re mostly harmless. What’s more problematic is phishing – a technique whereby fraudsters try to con you by posing as trustworthy sender addresses in an attempt to get hold of sensitive data. These messages appear genuine too, because without a digital signature, it’s very easy to assume a trusted identity online. In order to protect customers and their own...

Captcha | codes and images for spam protection

Captcha: codes, images and puzzles for spam protection

For years, the captcha has been a necessary evil for securing interactive web applications (e.g. online forms) against spam. The fully-automatic public Turing test distinguishes between computers and humans. The test exposes which automatic queries are performed by spam robots, which then minimizes the administrative effort needed for interactive websites. We present the most common types of...

What is a botnet?

Botnets: definition and protection tips

Botnets are tricky to spot, but they’re all over the internet and they cause all kinds of damage every day. They lurk inconspicuously in the background and use millions of private computers for malicious purposes. This guide explains how botnets work, how to keep them away, and how you can avoid falling victim to an illegal network.

What is greylisting?

What is greylisting?

Greylisting is an effective method for preventing mass spam emails from being sent out. Since this process happens in the background, most users are unaware that their inbox is being protected by greylisting. Here you will learn exactly how this method works on a technical level.

S/MIME: the standard method for e-mail encryption

S/MIME: how to encrypt and sign your e-mails

If you send an e-mail without additional security measures, it’s like sending a postcard: if everything goes as planned, the information should arrive unchanged and unread in the recipient’s inbox. However, if someone intercepts the card or the e-mail in transit, they can read the contents without any problem and make as many changes as possible. Just like you would use an opaque envelope to...

How to protect your website from malware

Malware on the server: consequences and countermeasures

A website operator is responsible for the security of a web project as well as the content. Neglecting security may lead to hackers easily infiltrating the system through security gaps. If a malware-infected website goes unnoticed, it could cause serious damage. It is therefore important to make sure your site is fully protected.

What Is Pharming?

Pharming: Protecting against Redirections to Fraudulent Websites

The internet is not only a vast marketplace for companies, but also a gold mine for criminals. They attempt to steal user data and redirect financial transactions by constantly developing new methods. One popular technique is called pharming. But how does pharming work and how can internet users protect themselves?

How to recognize spam e-mails and prevent them

The right way to deal with spam

Billions of spam e-mails are sent daily. These annoying messages cost time and get on your nerves, especially when malware finds its way onto your computer or private data falls into the wrong hands. Just a few small tricks and a bit of caution when dealing with e-mails can remedy the situation.

How to optimize professional e-mail signatures

Professional e-mail signatures

A professional e-mail signature is a standard part of business communication. Private users can also stand to gain from these e-mail additions. But what exactly does a good e-mail signature contain? And which information should your company include when sending messages to customers or business partners?


Wrap up 2020 with online success
We’re dropping our prices on some of our best products to help you
get your business ready for the holiday season.
Save up to 75 %