Info Icon

Microsoft is currently warning customers about a serious security vulnerability in connection with docx files. The dangerous thing about this vulnerability is the fact that simply opening the respective Word file is sufficient to execute the malicious code and enable remote code execution. An additional activation of any macros is not necessary. Read on to find out how you can protect yourself from this danger.

Wie Künstliche Intelligenz Phishing skalierbar macht Preview

With the rapid development in the field of artificial intelligence, the field of IT security is facing great challenges: Like any new technology, artificial intelligence and so-called machine learning can be abused by criminals. What this means for the fight against phishing, ransomware and spam, and how you can already protect yourself against them, we explain in this blog article.

Excel als Malware-Schleuder Gefahr durch XLL-Dateien Preview

Criminals are always finding new ways to distribute malware, and the battle against attacks from the internet is continuously fought. Sometimes the good guys win, but no sooner is one threat defused than the next one pops up. Not only that: ransomware attacks are increasing dramatically. In the current case, the attacks are using XLL files, which are used to install malware on the victims’ computers. What XLL files are, why they are so dangerous and how NoSpamProxy protects you from this threat, you will learn in this blog article.

Rich Text File Type Evasion Tricks erfolgreich abwehren Preview

Since this week, we have been noticing a new wave of attacks with RTF documents, where spammers use various “file type evasion tricks”.

DomainKeys Identified Mail DKIM Preview

In the fifth part of our series on sender reputation, we explain how you can use DNS-based Authentication of Named Entities (DANE) to ensure the authenticity of certificates and protect your email traffic from access by criminals.

Net at Work kooperiert für NoSpamProxy mit neuem Distributor Fokus MSP 667

Fokus MSP will distribute the entire NoSpamProxy service portfolio, focusing primarily on the cloud offering as well as on system houses and other resellers offering managed services.

DomainKeys Identified Mail DKIM Preview

In the fourth part of our series of articles on sender reputation, we show you how you can use Domain-based Message Authentication, Reporting and Conformance (DMARC) to determine how the receiving server should authenticate your emails and what it should do if authentication fails. In addition, we explain how you can use DMARC to quickly be informed about abuse of your domain and thus protect the reputation of your domain.