For months we have been reading about increasingly sophisticated attacks on companies. With every new wave, we are amazed to discover that a particular virus or trojan is especially dangerous and clever. The programmer of the malware may even award himself or herself a medal if the German BSI issues a report or a news report mentions the attack.
Criminals have recently launched a wave of email attacks targeting industrial AutoCAD files. The focus is on companies in the renewable energy and automotive sectors. Industrial espionage thus reaches an unprecedented scale.
A new wave of spam emails and viruses is currently affecting IT systems around the world. Since early November 2018, fake invoices, bank account warnings and other forged documents containing malicious code in the form of banking trojan Emotet are being distributed.
In phishing emails, criminals sometimes pretend to be financial institutions, sometimes online shops, sometimes lottery organisations, and sometimes even your boss. Add to this a faithfully recreated email and website design, and suddenly there is a great danger of a successful phishing attack. So how is it possible to identify a phishing attack? With our overview of the characteristics of phishing emails, you can now detect any attempt at fraud and learn how to detect dangerous emails.
Ransomware such as Locky, WannaCry and GandCrab has been making headlines lately. Criminals use this type of malware to gain access to individual files or the entire computer. At the same time, they prevent access by the rightful owner by means of encryption. The owner is allowed access only after a ransom has been paid.
The University of Rostock replaces Sophos and Vamsoft with the central email relay NoSpamProxy to ensure secure and uninterrupted email communication for more than 16,500 users. With NoSpamProxy Protection, students and staff avoid spam and malware as completely as technically possible.
Phishing emails enable scammers to capture relevant data from affected companies. Phishing attacks can be fended off by the possibilities of sender reputation management. Stefan Cink, NoSpamProxy product manager, explains how administrators can protect their company against phishing emails in an article released in the IT-Administrator magazine.
How to use SPF-authenticated servers in “Corporate email servers” Similar to Microsoft Exchange, some NoSpamProxy features can only be enabled through a PowerShell cmdlet. Specifying an “SPF-authenticated corporate email server” is one such feature. Entries of this kind facilitate the maintenance of NoSpamProxy enormously. “Corporate email servers” define the servers of a company that are […]
NoSpamProxy
Categories
Latest News
- NoSpamProxy Server 15.1 now available24.04.2024 - 15:38
- Deactivation of the knowledge base: What you need to do now23.04.2024 - 10:00