Malware endangers computers, systems, IT infrastructures, and entire companies. The aim of these attacks, which are carried out using malware, is to capture data, documents and passwords. In most cases, the criminals want to enrich themselves with the money of their victims. The financial losses for private individuals or companies can be serious: Financial damages, including insolvency, can be caused by malware if action is not taken in time.
For months we have been reading about increasingly sophisticated attacks on companies. With every new wave, we are amazed to discover that a particular virus or trojan is especially dangerous and clever. The programmer of the malware may even award himself or herself a medal if the German BSI issues a report or a news report mentions the attack.
Criminals have recently launched a wave of email attacks targeting industrial AutoCAD files. The focus is on companies in the renewable energy and automotive sectors. Industrial espionage thus reaches an unprecedented scale.
Sending large attachments by email can cause problems because images, videos or large documents often exceed the maximum file size allowed. This is becoming increasingly problematic because more and more data is generated every day. Countless image and multimedia files created using smartphone cameras are proof of this. Research shows that the average size of the files that users want to send as email attachments is growing from year to year. This puts a strain on corporate email infrastructures, resulting in bans on the sending of large files, the setting of limits or a case-by-case basis approval policy.
In phishing emails, criminals sometimes pretend to be financial institutions, sometimes online shops, sometimes lottery organisations, and sometimes even your boss. Add to this a faithfully recreated email and website design, and suddenly there is a great danger of a successful phishing attack. So how is it possible to identify a phishing attack? With our overview of the characteristics of phishing emails, you can now detect any attempt at fraud and learn how to detect dangerous emails.
With the last Microsoft patchday on September 12th, a security update for the .NET framework was released, which closes a critical vulnerability. To exploit the vulnerability, the victim must open a document specially prepared by the attacker. Even if there is no direct danger for NoSpamProxy customers, we recommend installing the update. Further information and the download links can be found here.
The new NoSpamProxy 12.3 already offers security against EFAIL even for communication partners with a weak infrastructure. Due to the far-reaching support of the new S/MIME 4.0 standard and Authenticated Encryption, many EFAIL-like attack methods are additionally neutralised. Numerous other improvements and new features ensure increased email security and increased resilience against the weaknesses of others. In our press release you can learn more about version 12.3 of NoSpamProxy, which Net at Work will present at the security fair it-sa from October 9 – 11, 2018 in Nuremberg.
Ransomware such as Locky, WannaCry and GandCrab has been making headlines lately. Criminals use this type of malware to gain access to individual files or the entire computer. At the same time, they prevent access by the rightful owner by means of encryption. The owner is allowed access only after a ransom has been paid.