Since this week, we have been noticing a new wave of attacks with RTF documents, where spammers use various “file type evasion tricks”.
As a security expert, you have a great deal of responsibility and also have your hands full. With our Winter School we offer in entertaining special trainings with many practical examples, for the necessary knowledge. The aim of our security training courses is to give you an understanding of the special IT security topics. Register now and save your place. Register now and save your place.
In the fifth part of our series on sender reputation, we explain how you can use DNS-based Authentication of Named Entities (DANE) to ensure the authenticity of certificates and protect your email traffic from access by criminals.
During the day, there was a disruption in email traffic to servers of 1&1 (web.de and GMX) due to a problem in the TLS or DANE area. We suspect it was related to 1&1’s TLS certificate expiring tomorrow. To enable delivery again, simply restart the gateway role(s) to clear the corresponding cache. IMPORTANT: NoSpamProxy Cloud […]
Fokus MSP will distribute the entire NoSpamProxy service portfolio, focusing primarily on the cloud offering as well as on system houses and other resellers offering managed services.
In the fourth part of our series of articles on sender reputation, we show you how you can use Domain-based Message Authentication, Reporting and Conformance (DMARC) to determine how the receiving server should authenticate your emails and what it should do if authentication fails. In addition, we explain how you can use DMARC to quickly be informed about abuse of your domain and thus protect the reputation of your domain.
Short URL services such as bit.ly are consistently used by criminals to get phishing links past email security solutions and onto their victims’ computers. In this article, we show you how short URLs are used as part of spam campaigns and why Heimdall and its dedicated web crawler offer ideal protection against attacks.
Ensuring the authenticity of senders is therefore a crucial step in ensuring the security of your IT infrastructure. In part 3 of our series of articles on sender reputation, we show you how you can use DomainKeys Identified Mail (DKIM) to check the domain information of sender addresses and prevent spam and phishing attacks.