The #Efail debate has caused great uncertainty among users and IT departments regarding the effectiveness of email encryption. Headlines such as S/MIME and PGP hacked were not only factually incorrect, but also led some self-proclaimed experts to advise against the use email encryption in general. The fact that the problem is not S/MIME or PGP itself was completely ignored. In reality, encryption is bypassed by getting the email client to send the plain text of the email to the attacker.
Emails are a common part of our private and professional communication. However, there seems to be no awareness of the vulnerability of each individual email sent. In many cases, emails travel across a variety of servers and countries, regardless of whether the recipient lives on a different continent or just on a different floor in the same building. The structure of the internet makes this possible.
As a result, anyone with the neccessary technical knowledge can intercept, read or even change emails at any node during transport. And he or she can write emails in your name.
How to use SPF-authenticated servers in “Corporate email servers” Similar to Microsoft Exchange, some NoSpamProxy features can only be enabled through a PowerShell cmdlet. Specifying an “SPF-authenticated corporate email server” is one such feature. Entries of this kind facilitate the maintenance of NoSpamProxy enormously. “Corporate email servers” define the servers of a company that are […]
The General Data Protection Regulation (GDPR) aims at harmonising the handling of personal information by organisations. Numerous organisations are already working on implementing and conforming to the individual items of the GDPR. But what’s really behind the GDPR?
Oliver Schonschek, journalist specialised in IT, uncovers common myths circulating online and answers the most important questions.
Advanced Persistent Threat (APT) is a complex attack on IT infrastructures. How to protect yourself from Advanced Persistent Threats?
The new EDI@Energy directive of the regulatory authority dictates detailed descriptions of the types of certificates and encryption algorithms messages must be sent or received.
NoSpamProxy
Categories
Latest News
- What is a Zero-Day Exploit?23.04.2025 - 14:00
- UPDATE: New Google email sender guidelines: What you need to do17.04.2025 - 12:00
- What is spoofing?11.04.2025 - 14:00