With the last Microsoft patchday on September 12th, a security update for the .NET framework was released, which closes a critical vulnerability. To exploit the vulnerability, the victim must open a document specially prepared by the attacker. Even if there is no direct danger for NoSpamProxy customers, we recommend installing the update. Further information and the download links can be found here.
The new NoSpamProxy 12.3 already offers security against EFAIL even for communication partners with a weak infrastructure. Due to the far-reaching support of the new S/MIME 4.0 standard and Authenticated Encryption, many EFAIL-like attack methods are additionally neutralised. Numerous other improvements and new features ensure increased email security and increased resilience against the weaknesses of others. In our press release you can learn more about version 12.3 of NoSpamProxy, which Net at Work will present at the security fair it-sa from October 9 – 11, 2018 in Nuremberg.
Ransomware such as Locky, WannaCry and GandCrab has been making headlines lately. Criminals use this type of malware to gain access to individual files or the entire computer. At the same time, they prevent access by the rightful owner by means of encryption. The owner is allowed access only after a ransom has been paid.
The University of Rostock replaces Sophos and Vamsoft with the central email relay NoSpamProxy to ensure secure and uninterrupted email communication for more than 16,500 users. With NoSpamProxy Protection, students and staff avoid spam and malware as completely as technically possible.
Dear NoSpamProxy customers,
since a few hours we see in customer environments that send outgoing e-mails from O365 via NoSpamProxy the error “Unable to relay”. We found that Microsoft uses a new certificate to identify all Office 365 email servers, which was issued by a GlobalSign CA rather than Microsoft’s own CA. The NoSpamProxy security check to see if the server is a valid “company e-mail server” fails and the e-mails are rejected. A new Fast Channel Version is available to fix this issue.
We apologize for any inconvenience caused.
Your NoSpamProxy Team
The #Efail debate has caused great uncertainty among users and IT departments regarding the effectiveness of email encryption. Headlines such as S/MIME and PGP hacked were not only factually incorrect, but also led some self-proclaimed experts to advise against the use email encryption in general. The fact that the problem is not S/MIME or PGP itself was completely ignored. In reality, encryption is bypassed by getting the email client to send the plain text of the email to the attacker.
Emails are a common part of our private and professional communication. However, there seems to be no awareness of the vulnerability of each individual email sent. In many cases, emails travel across a variety of servers and countries, regardless of whether the recipient lives on a different continent or just on a different floor in the same building. The structure of the internet makes this possible.
As a result, anyone with the neccessary technical knowledge can intercept, read or even change emails at any node during transport. And he or she can write emails in your name.
From a possible 100 points, NoSpamProxy achieves a dream result with 99,99 points and receives the title VB Spam + Gold from the renowned IT security certification institute Virus Bulletin.