Image: What are spam messages and how can you avoid them?

What are spam messages and how can you avoid them?

Every day, countless spam emails reach inboxes worldwide. While many are irritating, others can be dangerous, carrying phishing links, malware, or fraudulent offers. Recognising the telltale signs of spam not only saves time but also protects your data and devices. With a few…

Read more
Image: What is an email whitelist and how does whitelisting work?Andrey_PopovShutterstock

What is an email whitelist and how does whitelisting work?

What is a whitelist and how can whitelisting be used for seamless email communication? A whitelist uses specifically added entries to exclude unwanted or harmful data from traffic. How do you set up such a passlist? Options exist with your own internet provider, through external…

Read more
Image: What is greylisting in email and how does it work?

What is greylisting in email and how does it work?

Greylisting is a proven and highly effective method to significantly reduce the worldwide sending of spam emails. Because it operates quietly in the background, most users never even notice that their inbox is being actively protected. Discover how the process works technically,…

Read more
Image: What is spear phishing and how does it work?

What is spear phishing and how does it work?

Online attacks are a daily occurrence, and most can be blocked with little effort. Spear phishing, however, is far more dangerous: carefully polished, highly convincing, and completely free of the usual red flags that make other scams easier to spot. These fraudulent messages are…

Read more
Image: How to encrypt and sign your emails with S/MIME

How to encrypt and sign your emails with S/MIME

Sending an email without extra security is akin to sending a postcard: If everything goes as expected, the message arrives intact and unread by anyone else. But if the postcard or email is intercepted during transit, the content can be read or altered freely. Discover how the…

Read more
Image: How to use two-factor authentication to protect your accountjijomathaidesignersshutterstock

How to use two-factor authentication to protect your account

With two-factor authentication, accounts can be effectively protected against hacking or phishing attacks. Since more than just a password is needed for login, internet criminals can’t do much with intercepted login details. In our guide, we explain how two-factor authentication…

Read more
Image: What are the best secure emails providers in 2026?

What are the best secure emails providers in 2026?

Whether for businesses, freelancers, or private individuals: Anyone sending emails should prioritise data protection and security. In this comparison article, we show you which secure email providers are the best in 2026. We highlight key features, including advanced…

Read more
Image: How to use PGP encryption for email

How to use PGP encryption for email

Online privacy is a sensitive issue that affects everyone from security experts to casual internet users. Whether you’re posting on social networks, carrying out banking transactions or buying from an online store, your data may not be sufficiently protected. The same applies to…

Read more
Image: How to encypt your emails with SSL/TLS

How to encypt your emails with SSL/TLS

Are the emails that you send and receive encrypted? If not, it’s about time you started. Only by encrypting the transmission and content of emails can you ensure that your data is secure while being sent. Otherwise, unauthorised persons can read your email traffic easily and…

Read more
Image: How to set up the Outlook spam filter and customise itRawpixel.comShutterstock

How to set up the Outlook spam filter and customise it

The Outlook spam filter moves unwanted and potentially malicious spam emails to the Junk folder. Even promotional emails that don’t meet typical spam criteria can be kept out of your inbox with the right settings. If legitimate messages are mistakenly flagged, the Outlook Junk…

Read more