Ransomware such as Locky, WannaCry and GandCrab has been making headlines lately. Criminals use this type of malware to gain access to individual files or the entire computer. At the same time, they prevent access by the rightful owner by means of encryption. The owner is allowed access only after a ransom has been paid.
A new wave of spam emails and viruses is currently affecting IT systems around the world. Since early November 2018, fake invoices, bank account warnings and other forged documents containing malicious code in the form of banking trojan Emotet are being distributed.
The term malware (“malicious software”) is often used as a synonym for terms such as virus or trojan. In fact, malware is the umbrella term for a variety of threats that users are exposed to. This malware is a major threat to IT infrastructures and systems and exposes data of all kinds to major risks. Malware has only one purpose: to harm the user. This damage is either financial or involves the loss or involuntary disclosure of confidential data or private information. By far the largest part of malware attacks is carried out via spam emails. Malware and spam have become substantial threats for companies and authorities with the spread of trojan Locky in 2016. Read more
The University of Rostock replaces Sophos and Vamsoft with the central email relay NoSpamProxy to ensure secure and uninterrupted email communication for more than 16,500 users. With NoSpamProxy Protection, students and staff avoid spam and malware as completely as technically possible.
Dear NoSpamProxy customers,
since a few hours we see in customer environments that send outgoing e-mails from O365 via NoSpamProxy the error “Unable to relay”. We found that Microsoft uses a new certificate to identify all Office 365 email servers, which was issued by a GlobalSign CA rather than Microsoft’s own CA. The NoSpamProxy security check to see if the server is a valid “company e-mail server” fails and the e-mails are rejected. A new Fast Channel Version is available to fix this issue.
We apologize for any inconvenience caused.
Your NoSpamProxy Team
The #Efail debate has caused great uncertainty among users and IT departments regarding the effectiveness of email encryption. Headlines such as S/MIME and PGP hacked were not only factually incorrect, but also led some self-proclaimed experts to advise against the use email encryption in general. The fact that the problem is not S/MIME or PGP itself was completely ignored. In reality, encryption is bypassed by getting the email client to send the plain text of the email to the attacker.
NoSpamProxy is a must at CeBIT 2018. This year CeBIT takes place for the first time in summer, from June 12 to 15 in Hannover. In cooperation with our partner Bundesdruckerei we will use practical examples to show you how easy it is to transmit DSGVO-compliant and encrypted emails containing personal data.
Gestern sorgte die Nachricht unter dem Hashtag #Efail für Schlagzeilen – Münsteraner Forscher veröffentlichten Exploits für S/MIME- und PGP-verschlüsselte E-Mails. Das NoSpamProxy-Team hat diese im Hinblick auf Relevanz für NoSpamProxy-Kunden geprüft und dazu heute eine Pressemeldung veröffentlicht.