How to Recognize and Avoid Email Phishing Scams

In today’s digital world, email phishing scams are one of the most common and dangerous threats to individuals and businesses. These deceptive emails attempt to trick recipients into revealing personal information, clicking on malicious links, or downloading harmful attachments. Phishing attacks can lead to identity theft, financial loss, and even security breaches for organizations. For Runbox users, these scams can specifically target your email account and compromise your sensitive data. But by staying vigilant and following a few key practices, you can protect yourself from these scams.

(more…)

Continue Reading →

Runbox: The Sustainable Choice for Secure Email Services

At Runbox, we believe in a world where our digital communications can have a positive impact on the environment. Our mission is to reduce energy consumption and minimize our ecological footprint, both as an organization and as individuals. We believe that every action, including sending an email, should contribute to a sustainable future. By choosing Runbox, you’re not just using a secure email service – you’re making a conscious choice to support sustainable practices and contribute to the protection of the planet.

(more…)

Continue Reading →

The FTC’s Report on Big Tech’s Personal Data Overreach: What You Need to Know

The Federal Trade Commission (FTC) has released a report exposing how Big Tech companies are overstepping privacy boundaries in their quest for user data. The report reveals the massive amount of personal information these companies collect, store, and profit from. Often, this is done without clear user consent or transparency. As concerns over data privacy grow, the report highlights the urgent need for stronger regulation and more responsible data practices.

In this blog post, we’ll break down the key findings of the FTC’s report and discuss how this overreach affects your privacy, along with what actions you can take to protect your data.

Key Findings of the FTC’s Report on Big Tech’s Data Practices

The FTC’s report, titled “A Look Behind the Screens: Examining the Data Practices of Social Media and Video Streaming Services” offers an in-depth look at how major technology companies, including Facebook (Meta), Google, Amazon, and others, are handling your personal data. Below are some of the major findings:

(more…)

Continue Reading →

Domains are for life, not just for…

We’ve written before about domains and how you can use your own domain with Runbox. However, there are some considerations to be made before you decide to get a domain and it’s easy to overlook some of the responsibilities you might be taking on.

In this blog post we want to add some further details to the topic of registering and owning a domain based on some of the ongoing considerations (and problems) our own customers have had to face when managing their domains.

(more…)

Continue Reading →

Runbox is not on Meta or X (Twitter) – Because Privacy Matters

Social media platforms like Meta (Facebook, Instagram) and X (Twitter) are huge parts of our online lives. They’re where we catch up with friends, get our news, and share ideas. But while these platforms bring us together in a lot of ways, they also come with big problems—especially when it comes to privacy and misinformation. For a company like Runbox, being part of these platforms just doesn’t make sense. Here’s why.

(more…)

Continue Reading →

Malware and Your Privacy: How to Defend Against Digital Threats

Malware poses a significant threat to our personal information and security. From ransomware to keyloggers, malicious software programs can infiltrate our devices and compromise our most sensitive data, including contact lists. In this post, we’ll explore how malware works, the risks it presents, and the potential consequences of a breach.

(more…)

Continue Reading →

Protect Your Data with Runbox: Secure, Private, and Based in Norway

We live in an era of constant digital surveillance, where governments and corporations collect vast amounts of personal data. Privacy has become one of the most pressing issues for people around the world. From targeted ads to government surveillance programs, personal information is constantly at risk. Protecting that privacy is not just a matter of convenience — it’s essential to safeguarding our freedoms, security, and autonomy. Runbox’s base in Norway plays a pivotal role in safeguarding your personal information.

(more…)

Continue Reading →

EU’s AI Act: What it is all about

From the perspective of the general public and society as a whole, so-called Artificial Intelligence (AI) was largely invisible until OpenAI removed the veil over GPT-3.5/ChatGPT in 2022.

Since then, the interest and use of AI, and General Purpose AI (GPAI), has exploded. AI implementations are creeping in everywhere, to great benefit in many respects. However, the warning signs are many — manipulated images, fabricated conversations, falsified news stories, and fake video-presented events can lead to unforeseeable negative consequences, for instance in influencing democratic elections.

This is also the case when AI is used to make decisions, since we know that there is always a risk of “AI hallucinations” where AI software produces incorrect or misleading information.

This simplified outline can serve as background for the EU’s AI Act, whose purpose is to put a societal control over the use and influence of AI/GPAI in particular, and the big tech companies in general.

So let’s dig into the matter, with the aim to describe what EU AI Act is, and to clarify its consequences, if any, for Runbox.

(more…)

Continue Reading →

Runbox Ensures User Security and Privacy through Unique Email Addresses

Runbox is dedicated to maintaining user security and privacy. A key practice that supports this commitment is our policy of not recycling email addresses. We do not assign old addresses to someone else.

Runbox is committed to user security and privacy, and a fundamental part of this commitment is our policy of always using unique email addresses for our users. We understand that your email address is a critical component of your digital identity, which is why we never reassign old addresses to new users. This practice safeguards your personal information and ensures that your communications remain private and secure.

By avoiding the reuse of email addresses, we help eliminate the risks associated with recycled addresses. This includes potential unauthorized access to sensitive information or confusion from multiple users sharing the same address. This approach not only protects your identity but also fosters a more reliable and trustworthy communication environment.

Using unique email addresses offers several benefits:

(more…)

Continue Reading →

Spam in Reverse: When Your Email Client Gets It Wrong

Spam these days is no joke. Keeping our inboxes tidy can feel like a full-time job, and just when you think you’ve got it under control, an unexpected twist occurs: legitimate emails end up in your Junk folder. Yes, we’re talking about the moment when you realize important messages are hiding away in spam purgatory, thanks to email clients like Apple Mail, Outlook and Thunderbird.

Last week we wrote about a dual spam filter approach using email clients and how to set this up. We also talk about how spam has increased dramatically lately, and the reasons why. Here we look at how legitimate emails can end up in the Junk folder

The Frustration of Missing Emails

We’ve all been there. You’re expecting an important email, maybe a project update or a message from a friend, and it never arrives. You check your inbox—nothing. You start to wonder if they even sent it. Then, on a whim, you dive into your Junk folder, and there they are. Emails you thought were lost, marked as spam by your email client.

But it gets even more frustrating. Sometimes you have already filtered these emails specifically. You added them on your allowlist (what we used to call whitelist) in your Runbox Webmail, meaning you’ve already done the work to ensure they reach your inbox. So, why does your email client override your careful training and send them to Junk anyway?

(more…)

Continue Reading →