Criminals are always finding new ways to distribute malware, and the battle against attacks from the internet is continuously fought. Sometimes the good guys win, but no sooner is one threat defused than the next one pops up. Not only that: ransomware attacks are increasing dramatically. In the current case, the attacks are using XLL files, which are used to install malware on the victims’ computers. What XLL files are, why they are so dangerous and how NoSpamProxy protects you from this threat, you will learn in this blog article.
Imminent danger from docx files: How to protect yourself (Update)
All TopicsMicrosoft is currently warning customers about a serious security vulnerability in connection with docx files. The dangerous thing about this vulnerability is the fact that simply opening the respective Word file is sufficient to execute the malicious code and enable remote code execution. An additional activation of any macros is not necessary. Read on to find out how you can protect yourself from this danger.
Spear-throwing machines: How Artificial Intelligence Makes Phishing Scalable
All Topics, News, NoSpamProxy ProtectionWith the rapid development in the field of artificial intelligence, the field of IT security is facing great challenges: Like any new technology, artificial intelligence and so-called machine learning can be abused by criminals. What this means for the fight against phishing, ransomware and spam, and how you can already protect yourself against them, we explain in this blog article.
Excel as a Malware Launchpad: Danger From XLL Files
All Topics, News, NoSpamProxy ProtectionCriminals are always finding new ways to distribute malware, and the battle against attacks from the internet is continuously fought. Sometimes the good guys win, but no sooner is one threat defused than the next one pops up. Not only that: ransomware attacks are increasing dramatically. In the current case, the attacks are using XLL files, which are used to install malware on the victims’ computers. What XLL files are, why they are so dangerous and how NoSpamProxy protects you from this threat, you will learn in this blog article.
Successfully fend off Rich Text File Type Evasion Tricks
All Topics, News, Tech & SupportSince this week, we have been noticing a new wave of attacks with RTF documents, where spammers use various “file type evasion tricks”.
Sender Reputation and Email Security – Part 5: DNS-based Authentication of Named Entities (DANE)
All Topics, NoSpamProxy Cloud, NoSpamProxy ProtectionIn the fifth part of our series on sender reputation, we explain how you can use DNS-based Authentication of Named Entities (DANE) to ensure the authenticity of certificates and protect your email traffic from access by criminals.
Support Information – Problems with the delivery of e-mails to 1&1 (web.de and GMX)
All Topics, Knowledge Base, News, Tech & SupportNet at Work partners with new distributor Fokus MSP for NoSpamProxy
All Topics, News, NoSpamProxy CloudFokus MSP will distribute the entire NoSpamProxy service portfolio, focusing primarily on the cloud offering as well as on system houses and other resellers offering managed services.
Sender Reputation and Email Security – Part 4: Domain-based Message Authentication, Reporting and Conformance (DMARC)
All Topics, NoSpamProxy Cloud, NoSpamProxy ProtectionIn the fourth part of our series of articles on sender reputation, we show you how you can use Domain-based Message Authentication, Reporting and Conformance (DMARC) to determine how the receiving server should authenticate your emails and what it should do if authentication fails. In addition, we explain how you can use DMARC to quickly be informed about abuse of your domain and thus protect the reputation of your domain.