• Link to Rss this site
  • Link to LinkedIn
  • Link to Youtube
  • Link to X
  • Link to Instagram
  • English English English en
  • Deutsch Deutsch German de
Sales: +49 5251 304-800 | Support: +49 5251 304-636
NoSpamProxy
  • PRODUCT
    • NoSpamProxy Cloud
    • NoSpamProxy Protection
    • NoSpamProxy Encryption
    • NoSpamProxy Large Files
    • NoSpamProxy Disclaimer
  • SOLUTIONS
    • M365 Mail Security
    • Managed Certificates
    • 32Guards
    • AS4
  • RESOURCES
    • Documentation
    • Forum
    • Webcast Training
    • Training Courses
    • Support
    • Software Download
  • PARTNERS
    • Finding Resellers
    • Becoming Reseller
    • Partner Portal
    • NFR Licenses
  • COMPANY
    • Contact
    • Testimonials
    • Team
    • Career
    • Events
    • Awards
  • PRICES
  • BLOG
  • FREE TRIAL VERSION
    • Price Request
    • Free Trial Version
  • English
    • Deutsch
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu
Wie sicher ist E-Mail-Verschlüsselung?

How Secure is Email Encryption?

News, NoSpamProxy Encryption

The #Efail debate has caused great uncertainty among users and IT departments regarding the effectiveness of email encryption. Headlines such as S/MIME and PGP hacked were not only factually incorrect, but also led some self-proclaimed experts to advise against the use email encryption in general. The fact that the problem is not S/MIME or PGP itself was completely ignored. In reality, encryption is bypassed by getting the email client to send the plain text of the email to the attacker.

Read more

20.06.2018/by Stefan Sturm
Welche Möglichkeiten der E-Mail-Verschlüsselung gibt es?

Possibilities of Email Encryption

All Topics, News, NoSpamProxy Encryption, Tech & Support

Emails are a common part of our private and professional communication. However, there seems to be no awareness of the vulnerability of each individual email sent. In many cases, emails travel across a variety of servers and countries, regardless of whether the recipient lives on a different continent or just on a different floor in the same building. The structure of the internet makes this possible.

As a result, anyone with the neccessary technical knowledge can intercept, read or even change emails at any node during transport. And he or she can write emails in your name.

Read more

18.04.2018/by Stefan Sturm
Info Icon

How to use SPF-authenticated servers in “Corporate email servers”

News, NoSpamProxy Encryption, NospamProxy Large Files, NoSpamProxy Protection, Product, Tech & Support

How to use SPF-authenticated servers in “Corporate email servers” Similar to Microsoft Exchange, some NoSpamProxy features can only be enabled through a PowerShell cmdlet. Specifying an “SPF-authenticated corporate email server” is one such feature. Entries of this kind facilitate the maintenance of NoSpamProxy enormously. “Corporate email servers” define the servers of a company that are […]

Read more
26.03.2018/by Stefan Cink

What’s really behind the General Data Protection Regulation?

All Topics, News, NoSpamProxy Encryption

The General Data Protection Regulation (GDPR) aims at harmonising the handling of personal information by organisations. Numerous organisations are already working on implementing and conforming to the individual items of the GDPR. But what’s really behind the GDPR?

Oliver Schonschek, journalist specialised in IT, uncovers common myths circulating online and answers the most important questions.

Read more

15.01.2018/by Stefan Sturm

How to protect yourself from APT33, APT34 or APT35

All Topics, News, NoSpamProxy Encryption, NospamProxy Large Files, NoSpamProxy Protection

Advanced Persistent Threat (APT) is a complex attack on IT infrastructures. How to protect yourself from Advanced Persistent Threats?

Read more

19.07.2017/by Stefan Sturm

New EDI@Energy directive – No problem with NoSpamProxy

News, NoSpamProxy Encryption, NospamProxy Large Files, NoSpamProxy Protection, Product

The new EDI@Energy directive of the regulatory authority dictates detailed descriptions of the types of certificates and encryption algorithms messages must be sent or received.

Read more

19.07.2017/by Stefan Sturm
Page 10 of 10«‹8910

SEARCH

PRODUCT

  • All Topics
  • NoSpamProxy Cloud
  • NoSpamProxy Protection
  • NoSpamProxy Encryption
  • NospamProxy Large Files

You need support?

You can find more information about NoSpamProxy in our documentation and forum.

CATEGORY

  • All Topics
  • News
  • Product
  • Tech & Support
  • Events
RSS Feed Logo RSS Feed Logo Subscribeto RSS Feed

NoSpamProxy

  • NoSpamProxy Cloud
  • NoSpamProxy Encryption
  • NoSpamProxy Large Files
  • NoSpamProxy Disclaimer
  • Price request
  • Team
  • Career
  • General terms and conditions
  • Data Protection Information for Business Partners and Applicants
  • Cybersecurity (PSIRT)

Partners

  • Becoming a reseller
  • Partners
  • Order Certificates
  • Newsletter

Categories

  • All topics
  • News
  • Support
  • Updates
  • Order certificates

Latest News

  • Was ist ein Zero Day Exploit Preview
    What is a Zero-Day Exploit?23.04.2025 - 14:00
  • Info Icon
    UPDATE: New Google email sender guidelines: What you need to do17.04.2025 - 12:00
  • Was ist Spoofing Preview
    What is spoofing?11.04.2025 - 14:00
IMPRINT • EULA • Privacy Policy • • © 2025 Net at Work GmbH
  • Link to Rss this site
  • Link to LinkedIn
  • Link to Youtube
  • Link to X
  • Link to Instagram
Scroll to top Scroll to top Scroll to top