Version 13.2 includes new features and important functional enhancements. One of the highlights of the new version is the automated certificate management for users of the German National Research and Education Network (DFN). The new Release 13.2 of NoSpamProxy automates the use of the DFN CA. When a new user is created, NoSpamProxy automatically retrieves […]
Since the beginning of the Corona pandemic at the end of 2019, cybercriminals have been exploiting fears of the Corona virus to spread malicious code via email. The criminals are doing this, for example, by establishing a relationship with the Corona virus in the contaminated emails, arguing emotionally or claiming a particular urgency. Many of the sensitized recipients fall for it, causing the entire IT network to become infected and allowing malware and ransomware to be spread unhindered.
The lung disease Covid-19 caused by the coronavirus SARS-CoV-2 has presented new challenges for society and people worldwide. Contact barriers, masks, closed shops, cancellations of events and cinema closures are just some of the consequences that have shaken up the everyday life that we have all taken for granted. Many people are particularly aware of the importance of social contacts and meetings in this time of crisis.
Much has been written lately about Emotet and the consequences that an infestation with this banking Trojan can have. Among other things, public institutions have had and are struggling with the consequences of successful cyberattacks that have polluted and crippled their respective IT infrastructures, with sometimes catastrophic consequences. The Berlin Chamber Court is perhaps the best-known example, as large amounts of data could probably be stolen over several days. A real IT total damage. We have already explained how you and your company can protect yourself from emotet elsewhere.
But what does an emotet email actually look like? Three concrete examples show how authentic emotet emails now look. All three examples have been reported to us and have only been anonymized by us to the extent necessary for data protection reasons.
A large number of cyber attacks hit public institutions and authorities in 2019. The administration of the city of Frankfurt am Main, the Berlin Chamber Court and the administration of Neustadt am Rübenberge are just three examples that show the catastrophic consequences that an infestation with malware can have for authorities. In all these cases, it was the banking Trojan Emotet – the most dangerous malware in the world at the moment, according to the Federal Ministry for Information Security (BSI) – that was able to paralyze these authorities and in some cases still does so.
Currently, due to a security vulnerability, criminals are apparently able to smuggle malicious code into iPhones and iPads via emails. Affected are iOS devices on whichenen the software is installed in version 13.4.1 or a previous version up to version 6 . The Federal Office for Information Security (BSI) assesses the vulnerability as very critical […]
The persistently high demand and the third award as champion in the PURS study of TechConsult clearly show the high quality and popularity of NoSpamProxy. An important cornerstone is the excellent manufacturer support.
In IT Finanzmagazin, the specialist magazine for IT and organisation at banks, savings banks and insurance companies, Metehan Manap, head of the IT Operational Services department at WWK, looks back on a great project in the field of e-mail encryption. Together with GlobalSign, NoSpamProxy secures the data protection compliant communication of the insurance group with […]
NoSpamProxy
Categories
Latest News
- NoSpamProxy Server 15.1 now available24.04.2024 - 15:38
- Deactivation of the knowledge base: What you need to do now23.04.2024 - 10:00