Currently, due to a security vulnerability, criminals are apparently able to smuggle malicious code into iPhones and iPads via emails. Affected are iOS devices on whichenen the software is installed in version 13.4.1 or a previous version up to version 6 . The Federal Office for Information Security (BSI) assesses the vulnerability as very critical […]
In IT Finanzmagazin, the specialist magazine for IT and organisation at banks, savings banks and insurance companies, Metehan Manap, head of the IT Operational Services department at WWK, looks back on a great project in the field of e-mail encryption. Together with GlobalSign, NoSpamProxy secures the data protection compliant communication of the insurance group with […]
In many cases, the banking Trojan Emotet reaches IT infrastructures via contaminated Office files containing so-called macros. A macro is a kind of mini-program that – if permission has been granted – executes a specific sequence of instructions. Cyber criminals have used macros to find a way to infect computers with emotet and other malware. Because they are often not needed, these macros can be prevented from running in Office 365, either manually or through Group Policy – if it weren’t for a glaring vulnerability in certain business versions of Office 365.eklatante Sicherheitslücke in bestimmten Business-Versionen von Office 365.
Stefan Cink, Product Manager of NoSpamProxy and email security expert at Net at Work, is the new Business Unit Manager for NoSpamProxy as of January 1, 2020. As Business Unit Manager, he reports directly to the management and is responsible for the business objectives regarding profitability, growth and sustainability. He takes over this task from Dr. Horst Joepen, who has led the expansion of the NoSpamProxy business as an external consultant for five years and will continue to actively support us as a consultant for strategy and new market opportunities.
Read the full press release (German only)
Every email is vulnerable – theoretically. The journey of an email through the Internet is long, although the speed of transmission often makes this forget. Emails can be intercepted, read, or even modified during transportation. At least if they are sent unencrypted. The consequences may be devastating: Qinthe ancendatous damage, loss of data or loss of image are at risk for all those who exchange emails unencrypted. In addition, unencrypted emails are already no longer compatible with data protection – also with regard to the General Data Protection Regulation (GDPR)
One way to enable secure email communication and send information confidentially and securely is to use PKI-based e-mail encryption and signature. PKI stands for Public Key Infrastructure, and the most common standard for such encryption is S/MIME (Secure/Multipurpose Internet Mail) Extensions).
IT infrastructures today are regularly exposed to dangerous and sophisticated attacks by hackers. With the growing number of attacks, the technological maturity of the attack methods used increases: Emotet, WannaCry, Locky, DDOS attacks or Zip bombs repeatedly threaten companies and authorities, and in many cases cause considerable damage. Read more
New verdict confirms: Messages in emails have legal effect even if they are filtered out and moved to the spam folder.
So-called false positives always pose a risk for many anti-spam solutions. These emails that are incorrectly recognized as spam are then either deleted or moved to quarantine or to the spam folder.
Ransomware such as Locky, WannaCry and GandCrab has been making headlines lately. Criminals use this type of malware to gain access to individual files or the entire computer. At the same time, they prevent access by the rightful owner by means of encryption. The owner is allowed access only after a ransom has been paid.