Since the beginning of the Corona pandemic at the end of 2019, cybercriminals have been exploiting fears of the Corona virus to spread malicious code via email. The criminals are doing this, for example, by establishing a relationship with the Corona virus in the contaminated emails, arguing emotionally or claiming a particular urgency. Many of the sensitized recipients fall for it, causing the entire IT network to become infected and allowing malware and ransomware to be spread unhindered.
Net at Work releases NoSpamProxy Cloud
All Topics, News, NoSpamProxy Encryption, NospamProxy Large Files, NoSpamProxy ProtectionNet at Work releases NoSpamProxy Cloud Net at Work GmbH announces the immediate availability of NoSpamProxy Cloud This enables customers to place the security of their Email communication in the hands of experienced Email security experts and obtain comprehensive protection measures as a managed service from the cloud. The new Managed Service for Email security […]
Cancellations and changes from version 14
All Topics, Tech & SupportCertain software versions will no longer be supported in the future version 14 of the NoSpamProxy. To avoid problems when updating from version 13.2 to version 14, you should check your infrastructure early and update software that is no longer supported. The following discontinuations do not affect version 13.2 but only version 14.
NoSpamProxy supports hospitals and healthcare facilities
All Topics, NewsNet at Work GmbH from Paderborn, Germany, manufacturer of the modular secure mail gateway solution NoSpamProxy, expresses its special thanks to all hospitals and healthcare institutions among its customers. Net at Work Net at Work offers the institutions free software maintenance for six months and thus foregoes considerable maintenance revenues. NoSpamProxy is recognized as a […]
Emotet returns
All Topics, News, NoSpamProxy ProtectionAfter a five-month timeout, the Trojan Emotet has returned with a remarkable wave of attacks. Since the beginning of February, the malware situation had initially calmed down before numerous cyber attacks occurred last Friday, especially in the USA and Great Britain.
Sales tax reduction: Special features for NoSpamProxy license business
All Topics, News, ProductIn the course of the sales tax reduction, there are special features that also affect the NoSpamProxy license business. For continuous services, which also include the licence business, the day on which the agreed service period ends is used to determine the tax rate. In fact, this means that from 01.07. every licence key with […]
When the QakBot rings twice
All Topics, News, NoSpamProxy ProtectionIt is not always nice to see old friends again. Especially not when they ring the doorbell at half past five in the morning, rummage through your entire house and then let in a whole gang of acquaintances who rob you. One way or another, the Malware QakBot – also known as QBot or Pinkslipbot-, which was first discovered in 2007 and has been reappearing in increasing numbers for several months.
How healthcare institutions protect themselves against cyber attacks
All Topics, News, NoSpamProxy ProtectionSince 2019, public authorities, universities and healthcare institutions have increasingly become the target of hacking attacks. The Berlin Court of Appeal, the University of Gießen and the Hospital of Fürth are only the best-known victims of cyber criminals. And they have two things in common: in all cases the IT infrastructures were infected with the malware Emotet, and the consequences of all infections were catastrophic.
CxO Fraud and Corona Pandemic: How to Protect Yourself
All Topics, NoSpamProxy ProtectionSince the beginning of the Corona pandemic at the end of 2019, cybercriminals have been exploiting fears of the Corona virus to spread malicious code via email. The criminals are doing this, for example, by establishing a relationship with the Corona virus in the contaminated emails, arguing emotionally or claiming a particular urgency. Many of the sensitized recipients fall for it, causing the entire IT network to become infected and allowing malware and ransomware to be spread unhindered.