Blog
Top 7 Email Security Trends You Need to Watch Out For
Email was invented nearly five decades ago (48 actually). But that does not mean it has remained stagnant. On the contrary, it has evolved countless times since 1972 until this day. We have seen new email providers come into the picture, said goodbye to many along the way, and welcomed new features that made email […]
November 30, 2023
The Best Open-Source Email Service
Why is CTemplar Using OpenPGP Encryption? In the technology community, that we at CTemplar are a proud member of, many new technologies are made through a collaboration between programmers, developers, engineers, and other experts. This ensures that knowledge gets shared and that the entire community (and not just one player) get to reap the benefits. This is […]
The Best 7 Free Email Security Tips for Keeping Your Account Anonymous
Besides being responsible for 397 thousand deaths (and still counting) and grinding the world economy to a near halt, the Covid-19 is responsible for another, more subverted danger. It’s yet another excuse for governments to take away our online privacy by having us download coronavirus tracking apps that then have access to our location, photos, […]
Most Costly Email Security Mistakes That Can Cost You Millions
Cybersecurity threats constantly loom over us. Among them, none can be as dangerous and damaging as those related to email security. Whether you create a private email account or a business, these threats are ever-present. For example, according to Verizon’s 2019 Data Breach Investigation Report (DBIR), 94% of all malware was delivered via email. Of course, malware […]
How to Make an Email Without Phone Verification?
What is phone number verification? Phone number verification allows you to learn if a phone number you’ve dialled exists, is connected to a network and can receive calls. When it comes to Gmail and other email providers, phone verification is also important as part of two-factor authentication (2FA). It allows Gmail to send you a code […]
How CTemplar Over Tor Makes Your Email More Anonymous and Secure
If you want to send an anonymous email to someone, it is not enough to simply use a fake name or not use your regular email address. There is plenty of other information that can give away your location or identity on the web. This includes your IP address, DNS server, ISP connections, cookies and more. Establishing […]
Everything About Anonymous Email You’ll Ever Need to Know
Imagine going through your day and someone behind you is recording your every step. Where you went to work, who you visited, when you went shopping, what you bought, etc. It wouldn’t be pleasant and if you say that person following you around, you would probably turn and tell them to stop it. Would you […]
How to Get On the Dark Web and Safely Email Someone From it?
Today, there are over 4.6 billion Internet users as of May 31st in the world, out of almost 7.8 billion people in total, according to the World Internet Users Statistics for 2020 Q1. In other words, almost 60% of people although mostly in developed countries) are using the Internet regularly. World Internet Statistics: WORLD INTERNET USAGE […]
What is PGP Encryption? Everything You Need to Know About Pretty Good Privacy
Today, we are far from lacking in online communication options. The Internet provides us with multiple ways to connect with other people all around the world, including Skype, Slack, Google Hangouts, online forums, Twitter, Discord and so on. However, with over 4 billion users, email is still the number one means of communication, especially in […]
What is S/MIME and Do You Need it?
Is your spam folder full? That’s good because it means that your email client’s filters are doing the job. But what if I tell you that they are not able to identify ALL of the spam and phishing emails you get. Some of those still slip through. You see, while spam and phishing have both […]
What is TLS Encryption and How it Makes Your Email More Secure?
As interest in the more commercial and public use of the Internet started to grow in the 1980s and 1990s, it soon became apparent that it would be necessary to somehow secure communications between web applications and servers. As such, many companies released their communication protocol standards, but the problem with those is that they […]
What is Spear Phishing?
Imagine two fishermen catching fish on a lake. One is throwing a net and is catching a variety of fish, most of them small. Maybe he catches something big enough, but maybe not. The other fisherman, on the other hand, has a different approach. Instead of casting a net in the lake without much planning […]
How to Identify a Malicious or Phishing Email?
The COVID 19 pandemic has forced most organizations to leave their offices and shift more toward working remotely and from home. This is causing a bigger reliance on email to communicate within the organization and, as such, more risk for email phishing, scam and other fraud. In just one week in April, for example, Google […]
Why Every Lawyer Needs to Encrypt Their Email?
Confidentiality has always been the most important element in the lawyer-client relationship. From the first time one person asked another to defend them in the court, the two have made a contract (first verbally and then in writing), that the lawyer will not reveal what their client tells them in confidence. Today, that confidence is […]
What is a Man-in-the-Middle Attack (MitM) and how to Prevent it
A “man-in-the-middle” attack takes place when a third party (cyber attacker) intercepts the transaction of data and information between two other parties and modifies it to steal sensitive information from them. In this article, we are going to look at what is man-in-the-middle attack and how it can be prevented using CTemplar encrypted email service. […]
Make Sure Your Email is Safe with Zero-Knowledge Encryption
If you count on online services and providers to keep your sensitive private and financial information secure, you are taking a huge risk. Instead of going after the user himself for the password, hackers today go after the provider, well aware of the fact that many don’t adequately protect their user’s data, including usernames and […]
How To Find IP Address (But Not With CTemplar)
Your data is regularly bought and sold by online data companies, usually without either your knowledge or consent. One of the most common pieces of data these companies buy and sell is your IP, or internet protocol address. Your IP can reveal a lot of information about you and because of that, this article will […]
This SMTP Injection in G Suite Allows Google Email Domains to be Spoofed
A lot can be said about Gmail relying on outdated and often unsecure protocols. For instance, we’ve already covered here on our blog how hackers were able to bypass Google’s 2FA security back in 2018. That’s just one example. One new example of this was discovered by Zohar Shachar in his blog post. Shachar is an ethical (whitehat) […]
What is a Business Email Compromise and How to Protect Against it?
Email fraud can take different forms. Email security mistakes cost businesses billions of dollars per year. One particularly effective and dangerous type of email scam is the business email compromise attack, or BEC attack. What is a BEC attack? A BEC attack is a type of email scam in which the attacker targets an organization’s email account and […]
Email Cyber Attacks are on the Rise. Protect Yourself, Don’t Wait to Get Hacked
Email cyber attacks are nothing new. They have been around in one form or another almost since email was first introduced. The first recorded instance of a spam email can be traced back to 1978 (the first email was sent in 1970, so just 8 years prior) and it was a message from Digital Equipment […]