Privacy basics

Phishing scams try to trick you into revealing sensitive data or downloading
malware, often leading to identity theft, credit card fraud, or other
cybercrime. Learn all about phishing and how to prevent it.
With billions of phishing emails sent dail

Around 50% of all emails contain trackers that spy on your email activity — over
160 billion messages sent every day. Here’s how they work and how to block them.
Working silently in the background, email trackers not only monitor how you
respond to

- Privacy basics
Email headers are the hidden part of emails containing vital information to
identify and authenticate messages. Learn how to read them to spot spam and stay
secure.
Have you received an unexpected email from a strange address? Is it actually
from so

- Privacy basics
When you encrypt files on your computer, it’s like storing them in a vault: Only
someone with the correct key can access them. That’s useful if you’re concerned
about hackers stealing your most sensitive documents or companies scanning your
data for

- Privacy basics
Two-factor authentication (2FA) is an extra layer of protection for online
accounts that requires you to use more than just your username and password to
log in.
With 2FA enabled, you can protect access to your online accounts even if your
password

- Privacy basics
Internet users of a certain age might recall earlier days of personal computing,
with stacks of labeled floppy disks or CDs lying around the office. Those have
all but disappeared thanks to the widespread availability of cloud storage,
which took off

- Privacy basics
When you’re emailed an important document, like a completed contract or a bank
statement, it usually comes as a PDF. If you’re sending a PDF that contains
sensitive information, you should try to prevent it from being accessed by
unauthorized parties

- Privacy basics
You can’t trace an email to a person. But email providers, ISPs, and law
enforcement agencies may identify and track you through your emails if you don’t
take steps to protect your privacy.
Whether to block spam, check for phishing, or simply invest

- Privacy basics
Ciphertext is unreadable, encrypted data that can only be read if you know the
key. Learn all about ciphertext and how it ensures your data privacy by securing
computers and online communications, including encrypted email.
When Julius Caesar wanted

- Privacy basics
Data breaches are the most common way for your email address to be leaked on the
internet. This can lead to it appearing in online forums, on the dark web, and
other public spaces. It takes an average of 277 days to identify and contain a
breach acco

- Privacy basics
From having too many inboxes to manage to switching to a new email provider,
there are many reasons why you’d want to delete your Gmail account. You might
even be concerned that Google is abusing your privacy, and want to switch to a
private Gmail al