Protecting your email address: how to do it

Protecting your email address: how to prevent spam

Spam robots, so-called harvesters, consistently search the internet for email addresses that can be used for unlawful advertising, phishing emails, and spreading viruses, worms, and Trojans. You’re recommended to have your contact details on your website, but how do you stop them from being misused? This article gives you advice on how to protect your email address.

What is greylisting?

What is greylisting?

Greylisting is an effective method for preventing mass spam emails from being sent out. Since this process happens in the background, most users are unaware that their inbox is being protected by greylisting. Here you will learn exactly how this method works on a technical level.

Change Gmail password

How to change your Gmail password

Gmail is Google’s popular free email application. To access their account, users have to log in using a password. But what if you forgot your password or want to change it? This guide sets out the steps to follow to reset or change your Gmail password.

DMARC (Domain-based Message Authentication Reporting and Conformance)

DMARC: Quickly spot misuse of your email domain

How can you spot fraudulent emails if they use a known sender name and look like familiar newsletters or service emails? One way is to use the DMARC verification protocol, which triggers appropriate measures if an email doesn’t pass certain checks. In this article we explain how DMARC can give you an early warning about possible misuse of your sender name.

Changing an Outlook Password

Outlook: how to change your password for mail accounts, data files, and in the web app

Microsoft Outlook is one of the most popular client solutions for retrieving and managing e-mails. Using the software, multiple e-mail accounts can be easily combined and controlled through one interface. For this purpose, Outlook only needs information about the corresponding mail server and the respective log-in data. If you change these, you only have to adjust them in the client settings. But...

Spear phishing

Spear phishing: targeted attacks on your data

Internet users are constantly the target of cyberattacks. Most attacks are easy to fend off, but a new form of scam has proven to be especially dangerous. Spear phishing messages don’t contain absurd claims or bad spelling. These deceitful messages target specific individuals and look frighteningly real. How do these attacks work?

What is an SPF record?

Understanding and using SPF records

How can the recipient of an email tell whether a message is actually coming from the person who appears to be sending it? Many scammers attempt to forge the email sender address. But you can protect yourself. You can verify the outbound mail server using the SPF (Sender Policy Framework), a popular authentication method. How does SPF work and what can it do?

What Is Pharming?

Pharming: Protecting against Redirections to Fraudulent Websites

The internet is not only a vast marketplace for companies, but also a gold mine for criminals. They attempt to steal user data and redirect financial transactions by constantly developing new methods. One popular technique is called pharming. But how does pharming work and how can internet users protect themselves?

E-Mail encryption with PGP

E-mail encryption: how PGP secures the content of your e-mails

Online privacy is a sensitive issue that affects experts and amateurs alike. Whether you’re posting on social networks, carrying out banking transactions, or buying from an online store, your data is not always sufficiently protected. The same applies to e-mails. Don’t let cyber criminals get their hands on your content by encrypting your e-mails.


Wait! We’ve got something for you!
Discover our special deals at IONOS!
Our most popular products, including cloud storage, hosting,
domains and more - now on sale.