Criminals have recently launched a wave of email attacks targeting industrial AutoCAD files. The focus is on companies in the renewable energy and automotive sectors. Industrial espionage thus reaches an unprecedented scale.
The term malware (“malicious software”) is often used as a synonym for terms such as virus or trojan. In fact, malware is the umbrella term for a variety of threats that users are exposed to. This malware is a major threat to IT infrastructures and systems and exposes data of all kinds to major risks. Malware has only one purpose: to harm the user. This damage is either financial or involves the loss or involuntary disclosure of confidential data or private information. By far the largest part of malware attacks is carried out via spam emails. Malware and spam have become substantial threats for companies and authorities with the spread of trojan Locky in 2016. Read more
A new wave of spam emails and viruses is currently affecting IT systems around the world. Since early November 2018, fake invoices, bank account warnings and other forged documents containing malicious code in the form of banking trojan Emotet are being distributed.
Sending large attachments by email can cause problems because images, videos or large documents often exceed the maximum file size allowed. This is becoming increasingly problematic because more and more data is generated every day. Countless image and multimedia files created using smartphone cameras are proof of this. Research shows that the average size of the files that users want to send as email attachments is growing from year to year. This puts a strain on corporate email infrastructures, resulting in bans on the sending of large files, the setting of limits or a case-by-case basis approval policy.
In phishing emails, criminals sometimes pretend to be financial institutions, sometimes online shops, sometimes lottery organisations, and sometimes even your boss. Add to this a faithfully recreated email and website design, and suddenly there is a great danger of a successful phishing attack. So how is it possible to identify a phishing attack? With our overview of the characteristics of phishing emails, you can now detect any attempt at fraud and learn how to detect dangerous emails.
With the last Microsoft patchday on September 12th, a security update for the .NET framework was released, which closes a critical vulnerability. To exploit the vulnerability, the victim must open a document specially prepared by the attacker. Even if there is no direct danger for NoSpamProxy customers, we recommend installing the update. Further information and the download links can be found here.
Ransomware such as Locky, WannaCry and GandCrab has been making headlines lately. Criminals use this type of malware to gain access to individual files or the entire computer. At the same time, they prevent access by the rightful owner by means of encryption. The owner is allowed access only after a ransom has been paid.
The University of Rostock replaces Sophos and Vamsoft with the central email relay NoSpamProxy to ensure secure and uninterrupted email communication for more than 16,500 users. With NoSpamProxy Protection, students and staff avoid spam and malware as completely as technically possible.
NoSpamProxy
Categories
Latest News
- NoSpamProxy Server 15.1 now available24.04.2024 - 15:38
- Deactivation of the knowledge base: What you need to do now23.04.2024 - 10:00