From October 22-24, 2024, IT security experts and decision-makers will again meet at the Exhibition Center Nuremberg. The focus is on the exchange of information about trends and innovations in the IT security industry.
The discussions surrounding the possible introduction of a “digital euro” are currently being used as an attack vector for phishing campaigns. Among others, fake websites of the KfW development bank, the European Central Bank, the non-profit consumer organization Stiftung Warentest and the business magazine Capital are being used.
Opening menus, paying parking fees, gaining entry to events, calling up information or logging into a WLAN, all this is possible with the help of QR codes. QR codes are practical, but can also be misused for criminal purposes: So-called “quishing” is now a widespread method used by fraudsters to obtain sensitive information such as usernames, passwords and credit card details. We explain how quishing works and how you can protect yourself in our blog post.
The latest update extends the functionality of the Outlook Add-in to include encryption and signature functions, among other things. This means that shared stack customers can now also use features that were previously reserved for NoSpamProxy Server and Private Stack customers.
From June 14, 2024, there will be a new certificate chain for email encryption for the Bundesagentur für Arbeit, the Jobcenters and the Institut für Arbeitsmarkt- und Berufsforschung. Find out what you need to do now in our blog article.
NoSpamProxy customers can now also use Sectigo certificates in the automated certificate management. This is particularly interesting for users of the German Research Network (DFN).
Both Barracuda and Sophos are approaching the end-of-life of their on-premises email security solutions. Our exclusive Competitive Upgrade PLUS sales promotion is aimed specifically at partners who support customers with Barracuda or Sophos email solutions. This is the perfect time to offer customers a future-proof alternative.
NoSpamProxy uses Bouncy Castle as an additional library for some operations. Bouncy Castle version 1.8.9 is used in the current NoSpamProxy version 15.1.940. Three new vulnerabilities have been published for Bouncy Castle. NoSpamProxy is not affected by any of these CVE.
NoSpamProxy
Categories
Latest News
- secIT 2025 – Get your free tickets now!23.01.2025 - 10:00
- Maximum security for international email communication at Olymp22.01.2025 - 10:00
- Webcast trainings focusing on sales & technology21.01.2025 - 10:00