The Outlook spam filter automatically moves unwanted and potentially fraudulent emails to the junk folder. Even junk mail that doesn’t meet the typical spam criteria can be kept out of your Outlook inbox with the right settings. In case of errors, the Outlook junk filter can be easily adjusted manually.
Spam robots, so-called harvesters, consistently search the internet for e-mail addresses that can be used for unlawful advertising, phishing e-mails, and spreading viruses, worms, and Trojans. You’re recommended to have your contact details on your website, but how do you stop them from being misused? This article gives you advice on how to protect your e-mail address.
Greylisting is an effective method for preventing mass spam emails from being sent out. Since this process happens in the background, most users are unaware that their inbox is being protected by greylisting. Here you will learn exactly how this method works on a technical level.
Gmail is Google’s popular free email application. To access their account, users have to log in using a password. But what if you forgot your password or want to change it? This guide sets out the steps to follow to reset or change your Gmail password.
Fake emails pose a major threat to recipients. At the same time, it’s becoming increasingly difficult to verify the authenticity of emails and sender addresses. One effective method of verifying the sending mail server and checking the authenticity of emails is called DKIM (DomainKeys Identified Mail). What is DKIM and how do you set it up?
How can you spot fraudulent emails if they use a known sender name and look like familiar newsletters or service emails? One way is to use the DMARC verification protocol, which triggers appropriate measures if an email doesn’t pass certain checks. In this article we explain how DMARC can give you an early warning about possible misuse of your sender name.
How can the recipient of an email tell whether a message is actually coming from the person who appears to be sending it? Many scammers attempt to forge the email sender address. But you can protect yourself. You can verify the outbound mail server using the SPF (Sender Policy Framework), a popular authentication method. How does SPF work and what can it do?
Internet users are constantly the target of cyberattacks. Most attacks are easy to fend off, but a new form of scam has proven to be especially dangerous. Spear phishing messages don’t contain absurd claims or bad spelling. These deceitful messages target specific individuals and look frighteningly real. How do these attacks work?
Microsoft Outlook is one of the most popular client solutions for retrieving and managing e-mails. Using the software, multiple e-mail accounts can be easily combined and controlled through one interface. For this purpose, Outlook only needs information about the corresponding mail server and the respective log-in data. If you change these, you only have to adjust them in the client settings. But...
If you send an e-mail without additional security measures, it’s like sending a postcard: if everything goes as planned, the information should arrive unchanged and unread in the recipient’s inbox. However, if someone intercepts the card or the e-mail in transit, they can read the contents without any problem and make as many changes as possible. Just like you would use an opaque envelope to...