In many cases, the banking Trojan Emotet reaches IT infrastructures via contaminated Office files containing so-called macros. A macro is a kind of mini-program that – if permission has been granted – executes a specific sequence of instructions. Cyber criminals have used macros to find a way to infect computers with emotet and other malware. Because they are often not needed, these macros can be prevented from running in Office 365, either manually or through Group Policy – if it weren’t for a glaring vulnerability in certain business versions of Office 365.eklatante Sicherheitslücke in bestimmten Business-Versionen von Office 365.
The Coronavirus pandemic, the outbreak of which was first discovered in Wuhan, Hubei Province, China, in late December 2019, is currently a constant topic in the news. Favoured by the hesitant behaviour of the Chinese authorities and global travel and air traffic, there are, according to information from the Federal Ministry of Health, at this point in time (as of 5 February 2020) more than 24,000 cases of infection and over 400 deaths attributed to the corona virus. In addition to these dramatic health consequences, the virus also poses other dangers.
IT infrastructures today are regularly exposed to dangerous and sophisticated attacks by hackers. With the growing number of attacks, the technological maturity of the attack methods used increases: Emotet, WannaCry, Locky, DDOS attacks or Zip bombs repeatedly threaten companies and authorities, and in many cases cause considerable damage. Read more
Since 7 June 2019, a warning about fake emails can be read on the website of the Federal Fiscal Court in Germany. According to the warning, previously unknown perpetrators send emails with malicious attachments and use the email domain of the Federal Fiscal Court in the sender. It goes without saying that the emails also look deceptively real. Although the Federal Fiscal Court’s warning is shared in the social media, the actual range is likely to be limited. The majority of the victims are informed – if at all – much too late. And this despite the fact that the DMARC specification is a freely available technology that could prevent this.
The new “No Spam Area” offers information and assistance on the topics of spam, malware and email security. It raises awareness of threats such as phishing, CxO fraud or Trojans, highlights effective countermeasures and assists in their concrete implementation.
New verdict confirms: Messages in emails have legal effect even if they are filtered out and moved to the spam folder.
So-called false positives always pose a risk for many anti-spam solutions. These emails that are incorrectly recognized as spam are then either deleted or moved to quarantine or to the spam folder.
We are increasingly surrounded by artificial intelligence (AI). Autonomous driving or automatic facial recognition are just two popular examples of how AI is changing our everyday lives. IT security is also on the verge of upheaval, as AI has enormous potential for defending against cyber attacks. The attackers do not rest and use AI to optimise their attacks. Despite all the hype, however, it is often overlooked that users today can already benefit from conventional functionalities that are on a par with AI-supported technologies.
Digital transformation is the change to modern workplaces that correspond to technical progress and the realities of people’s lives. However, this shift to cloud-based working should not come at the expense of security or data protection – especially in light of the fact that emails are still the most important gateway for cyberattacks. So what options does Microsoft 365 offer to secure email traffic and protect your company against spam and malware?
NoSpamProxy
Categories
Latest News
- NoSpamProxy Server 15.1 now available24.04.2024 - 15:38
- Deactivation of the knowledge base: What you need to do now23.04.2024 - 10:00