Illustration depicting a phishing attack: a hand holds a fishing line with a hook that extracts a document with login from a blue envelope. The document shows a field with asterisks, symbolizing a password. Next to the envelope is a padlock icon and a skull with two crossbones inside two comic icons
Privacy
Security

Social Engineering, the cyber attack exploiting human weakness

Social engineering is a cunning technique that exploits human weaknesses to carry out attacks and obtain sensitive information for fraudulent purposes. There is no antivirus that can fully protect you from this threat. This technique relies on manipulating people through...

Privacy

Gaia-X and Data Sovereignty, why they matter for Europe

What is Gaia-X? Gaia-X is a major European project that aims to create a standard for the creation of a European Cloud that will be based on a transparent and sovereign data infrastructure. The aim of the project is the...

The image appears to illustrate web development and data privacy concepts, particularly focusing on cookies and security.
News
Privacy
Solutions

Be Compliant with the Cookie Law for Free with Open Source Software

With the arrival of the GDPR in 2018, the Cookie Law issued in 2014 began to show some weaknesses. It has therefore been strengthened and since the beginning of 2022 the owners of all websites must comply with the new...

Cybersecurity and Data Protection – A symbolic representation of online security, featuring a wooden block with a padlock icon placed on a computer keyboard. Ideal for topics related to digital privacy, secure communications, and IT security solutions.
Privacy
Security
Solutions

Emotet, the virus stealing email fragments to be more credible

Recently, users have reported emails being sent under their name, both to unknown recipients and contacts. Messages contained a virus-infected Office documents attached to them. What we have in front of our eyes is the return of Emotet, a very...

Email spoofing - Phishing risks and email security
Privacy
Security
Solutions

Email Spoofing: emails from my email address that I didn’t send

Email spoofing is a technique used to send emails making the victim believe they are receiving emails from a trusted person. It is usually used in spam emails or to convey attacks. Although you may think that forging a sender's...

account takeover protection
Privacy
Qboxmail
Security

What is Account Takeover and how to protect corporate emails against cyberattacks

Account Takeover is a type of cyberattack used to embody a victim's identity by stealing their Webmail login credentials.Identity theft is often used to send spam emails under the victim's name. However, it could also be used to carry out...

We use cookies to provide you a better browsing experience, by continuing you accept their use. For more information visit the Privacy policy page.

Accept