People walking around an old city center during the holidays.

5 popular holiday scams to watch out for this season

Don’t let scammers ruin your holidays. Get informed about these 5 popular holiday scams to protect your wallet.

5 min read

How N26 will contact you — and how we won’t

Scammers and fraudsters may pose as representatives of N26 to try to steal customer data. Here, we dive into how N26 will and won’t contact you, so that you can spot the scams.

8 min read

Dr. Anastasia Kotovskaia, LL.M.

Cybersecurity and operational resilience: challenges for the financial sector

Finance expert Dr. Anastasia Kotovskaia discusses the role of corporate IT security, the ongoing threat of cybercrime, and the challenges the industry is currently facing.

11 min read

Illustration of a person on a mountain top over the clouds looking at their phone.

The benefits of cloud banking, explained

More and more banks are moving their systems to the cloud. Here, is why cloud banking is so effective, efficient, and safe.

6 min read

Illustration of a woman holding a credit card on a laptop with a shadow behind her.

The dark web is after your data. Here’s what you need to know

We take a deeper look at the dark web — and explain the behind-the-scenes work we do to keep N26 customers’ data safe.

10 min read

Woman looking at her cellphone.

What is a ransomware attack? How to protect your files

Ransomware is a particularly devious kind of cyber attack that can infect your computer and hold your files hostage. Learn more here about how to defend yourself and your devices.

6 min read

Man walking in front of bilboards.

What is adware? What you need to know to keep your system secure

Fed up with pesky pop-up ads while you’re browsing online? There's a chance that adware is the cause — learn more about this type of malware and how to remove it from your system.

6 min read

Person on computer.

What is spyware? How to safeguard your devices

Is your online data safe? A certain type of malware known as spyware is specially designed to infiltrate users’ devices and steal sensitive personal information

6 min read

Man in a coffee shop working on his laptop.

What is a Trojan horse virus? (and what to do if your system gets infected)

If undetected, Trojan horse can do quite a bit of damage — they operate in the background, stealing sensitive information and compromising the security of your data.

6 min read

Person typing on laptop.

Scareware: What it is and how to protect yourself

Scareware scams can be stressful, costly, and time-consuming. Luckily, there are warning signs that can help you spot scareware hiding in plain sight — read on to learn more.

3 min read

A woman looking at her cellphone.

Vishing — a growing threat

Voice phishing — aka vishing — is on the rise. Learn how to recognize these scams and protect yourself from fraud.

5 min read

Stay safe while online shopping.

How to keep your money safe when you shop online

Protect yourself from fraud with this simple guide.

8 min read

woman holding a cell phone.

Deposit protection scheme: why your money is protected

Looking for reassurance that your money is protected? Deposit protection schemes help secure the money in your bank account.

5 min read