Net at Work releases NoSpamProxy Cloud Net at Work GmbH announces the immediate availability of NoSpamProxy Cloud This enables customers to place the security of their Email communication in the hands of experienced Email security experts and obtain comprehensive protection measures as a managed service from the cloud. The new Managed Service for Email security […]
Net at Work GmbH from Paderborn, Germany, manufacturer of the modular secure mail gateway solution NoSpamProxy, expresses its special thanks to all hospitals and healthcare institutions among its customers. Net at Work Net at Work offers the institutions free software maintenance for six months and thus foregoes considerable maintenance revenues. NoSpamProxy is recognized as a […]
After a five-month timeout, the Trojan Emotet has returned with a remarkable wave of attacks. Since the beginning of February, the malware situation had initially calmed down before numerous cyber attacks occurred last Friday, especially in the USA and Great Britain.
In the course of the sales tax reduction, there are special features that also affect the NoSpamProxy license business. For continuous services, which also include the licence business, the day on which the agreed service period ends is used to determine the tax rate. In fact, this means that from 01.07. every licence key with […]
It is not always nice to see old friends again. Especially not when they ring the doorbell at half past five in the morning, rummage through your entire house and then let in a whole gang of acquaintances who rob you. One way or another, the Malware QakBot – also known as QBot or Pinkslipbot-, which was first discovered in 2007 and has been reappearing in increasing numbers for several months.
Since 2019, public authorities, universities and healthcare institutions have increasingly become the target of hacking attacks. The Berlin Court of Appeal, the University of Gießen and the Hospital of Fürth are only the best-known victims of cyber criminals. And they have two things in common: in all cases the IT infrastructures were infected with the malware Emotet, and the consequences of all infections were catastrophic.
Much has been written lately about Emotet and the consequences that an infestation with this banking Trojan can have. Among other things, public institutions have had and are struggling with the consequences of successful cyberattacks that have polluted and crippled their respective IT infrastructures, with sometimes catastrophic consequences. The Berlin Chamber Court is perhaps the best-known example, as large amounts of data could probably be stolen over several days. A real IT total damage. We have already explained how you and your company can protect yourself from emotet elsewhere.
But what does an emotet email actually look like? Three concrete examples show how authentic emotet emails now look. All three examples have been reported to us and have only been anonymized by us to the extent necessary for data protection reasons.
A large number of cyber attacks hit public institutions and authorities in 2019. The administration of the city of Frankfurt am Main, the Berlin Chamber Court and the administration of Neustadt am Rübenberge are just three examples that show the catastrophic consequences that an infestation with malware can have for authorities. In all these cases, it was the banking Trojan Emotet – the most dangerous malware in the world at the moment, according to the Federal Ministry for Information Security (BSI) – that was able to paralyze these authorities and in some cases still does so.