NoSpamProxy
Categories
Latest News
- What is scamming?24.03.2025 - 10:00
- Expiry of the licence for the Core Antispam Engine17.03.2025 - 14:41
- Attack vector e-invoice: How to protect your mailbox28.02.2025 - 10:00
You are currently viewing a placeholder content from Google Maps. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More Information
What is scamming?
32Guards, All Topics, NoSpamProxy Cloud, NoSpamProxy ProtectionScamming is no longer a fringe phenomenon. Behind the innocent-sounding term lies a multitude of sophisticated scams that are used on a massive scale, particularly via email. Whether phishing, CxO fraud or romance scams, in this article you will learn how modern scams work, how to recognise them and what measures you can take to effectively protect yourself and your company.
Expiry of the licence for the Core Antispam Engine
25Reports, 32Guards, All Topics, News, NoSpamProxy Cloud, NoSpamProxy Disclaimer, NoSpamProxy Encryption, NospamProxy Large Files, NoSpamProxy Protection, Product, Tech & Support, UpdatesOn March 15, 2025, the licence for the Core Antispam Engine expired for some customers. In some cases, this resulted in temporary rejections of emails.
Attack vector e-invoice: How to protect your mailbox
All Topics, NoSpamProxy Cloud, NoSpamProxy ProtectionE-invoicing will be mandatory from January 1, 2025 and many companies already use a dedicated email address to receive e-invoices. Find out why this makes sense and how NoSpamProxy optimally protects your mailbox in this blog article.
Shutdown of the DNS blacklist Nixspam
All Topics, Tech & SupportThe spam filter project Nixspam is ceasing operations. Since January 16, 2025, the DNS blacklist (DNSBL) no longer contains any entries under the domain name ix.dnsbl.manitu.net.
End-to-End Encryption or Gateway-to-Gateway Encryption?
All Topics, NoSpamProxy Cloud, NoSpamProxy EncryptionThe protection of personal and business data is becoming increasingly important. Whether private chats or the exchange of sensitive documents, ensuring the confidentiality and integrity of transmitted information is crucial. End-to-end encryption (E2EE) ensures that data is only accessible to the intended recipients and is protected against attacks and manipulation. However, gateway-to-gateway encryption (G2GE) also offers secure protection. Find out exactly what the differences are and which approach makes sense for you in our blog post.
Phishing with fake invoices: Hijacked mail logins are used for new phishing attacks
32Guards, All Topics, NoSpamProxy Cloud, NoSpamProxy Protection, Tech & SupportCyber criminals are currently using phishing to spread a malware called Strela Stealer via German-language emails. Strela Stealer harvests login data from Outlook and Thunderbird accounts. The criminals then use originally legitimate emails containing invoices, which they forward and send to their victims. These victims then receive what appear at first glance to be identical emails, with only the recipient address and the attachment having been changed. Instead of the invoice, the criminals send .zip files with the same name that contain malware. Our data based on the meta information collected in 32Guards shows the approach of the spammers as well as the distinctive features of phishing emails – and how you can protect your email address from misuse.
DMARC Policy: Why p=none is a bad choice
All Topics, NoSpamProxy Cloud, NoSpamProxy Encryption, NoSpamProxy Protection, Tech & SupportDMARC (Domain-based Message Authentication, Reporting, and Conformance) plays a central role in protecting email domains against misuse. However, the correct configuration of a DMARC policy is crucial: a seemingly harmless setting such as ‘p=none’ can lead to considerable security risks. In this article, we explain why ‘p=none’ is a bad choice and what an effective DMARC record should look like.
secIT 2025 – Get your free tickets now!
All Topics, Events, Newsheise medien’s secIT is THE congress trade fair for IT security officers, data centre managers, network administrators and decision-makers in security matters, and we’ll be there!