Gmail’s spam filtering functions completely independently and achieves great results. However, the defense works even better if you configure the Gmail spam filter settings and optimise them over time. In this text, we will explain what options you have with the spam filter and what you should bear in mind when using it.
Large-scale hacker attacks constantly make their way into the news, which then causes panic among users. Hackers exploit e-mail addresses and passwords by using them for criminal purposes. Victims often don’t even realise that their data has been stolen. We introduce four tools to help you check whether your Email has been hacked.
How can you protect yourself from a flood of spam in your inbox? Blocklists are used to filter out emails from known spam senders. But what should you do if you yourself land on a blocklist? Keep reading to find out everything you need to know about email blacklists.
What is an allowlist and how can allowlisting help you have more smooth email communication? Formerly known as email whitelisting, allowlisting uses a curated list of permitted senders to prevent dangerous or unwelcome content from entering your inbox. How do you create such a list? Keep reading to find out.
Greylisting is an effective method for preventing mass spam emails from being sent out. Since this process happens in the background, most users are unaware that their inbox is being protected by greylisting. Here you will learn exactly how this method works on a technical level.
The Outlook spam filter automatically moves unwanted and potentially fraudulent emails to the junk folder. Even junk mail that doesn’t meet the typical spam criteria can be kept out of your Outlook inbox with the right settings. In case of errors, the Outlook junk filter can be easily adjusted manually.
Spam robots, so-called harvesters, consistently search the internet for e-mail addresses that can be used for unlawful advertising, phishing e-mails, and spreading viruses, worms, and Trojans. You’re recommended to have your contact details on your website, but how do you stop them from being misused? This article gives you advice on how to protect your e-mail address.
Gmail is Google’s popular free email application. To access their account, users have to log in using a password. But what if you forgot your password or want to change it? This guide sets out the steps to follow to reset or change your Gmail password.
Fake emails pose a major threat to recipients. At the same time, it’s becoming increasingly difficult to verify the authenticity of emails and sender addresses. One effective method of verifying the sending mail server and checking the authenticity of emails is called DKIM (DomainKeys Identified Mail). What is DKIM and how do you set it up?
How can you spot fraudulent emails if they use a known sender name and look like familiar newsletters or service emails? One way is to use the DMARC verification protocol, which triggers appropriate measures if an email doesn’t pass certain checks. In this article we explain how DMARC can give you an early warning about possible misuse of your sender name.