In many cases, the banking Trojan Emotet reaches IT infrastructures via contaminated Office files containing so-called macros. A macro is a kind of mini-program that – if permission has been granted – executes a specific sequence of instructions. Cyber criminals have used macros to find a way to infect computers with emotet and other malware. Because they are often not needed, these macros can be prevented from running in Office 365, either manually or through Group Policy – if it weren’t for a glaring vulnerability in certain business versions of Office 365.eklatante Sicherheitslücke in bestimmten Business-Versionen von Office 365.
Stefan Cink, Product Manager of NoSpamProxy and email security expert at Net at Work, is the new Business Unit Manager for NoSpamProxy as of January 1, 2020. As Business Unit Manager, he reports directly to the management and is responsible for the business objectives regarding profitability, growth and sustainability. He takes over this task from Dr. Horst Joepen, who has led the expansion of the NoSpamProxy business as an external consultant for five years and will continue to actively support us as a consultant for strategy and new market opportunities.
Read the full press release (German only)
Every email is vulnerable – theoretically. The journey of an email through the Internet is long, although the speed of transmission often makes this forget. Emails can be intercepted, read, or even modified during transportation. At least if they are sent unencrypted. The consequences may be devastating: Qinthe ancendatous damage, loss of data or loss of image are at risk for all those who exchange emails unencrypted. In addition, unencrypted emails are already no longer compatible with data protection – also with regard to the General Data Protection Regulation (GDPR)
One way to enable secure email communication and send information confidentially and securely is to use PKI-based e-mail encryption and signature. PKI stands for Public Key Infrastructure, and the most common standard for such encryption is S/MIME (Secure/Multipurpose Internet Mail) Extensions).
A Bochum research group today published a vulnerability in encrypted PDF files The BSI had published a preliminary information on this subject. It is to be expected that users will be highly unsettled. NoSpamProxy clarifies for whom which risks actually exist and who is affected. For special safety requirements, alternatives are shown.
At the security fair it-sa, which takes place from 08-10 October in Nuremberg, we will show you our new version 13.1! In addition to numerous improvements, it offers optimization for SaaS operation. On this basis, we will in future offer partners whoare able to set up and develope a managed service for customersare shying awayfrom a own cloud service. A total of 18 new features and feature enhancements include adding new checks to the Reputation Filter, supporting additional file types in the content filter to increase the security of email attachments, and VIP Encrypt©, which, in conjunction with Office 365, can be used to implement particularly secure content encryption.
The official beta phase for NoSpamProxy 13.2 will start on April 3, 2020. Interested customers now have a unique opportunity to get to know the new features before the official release.
IT infrastructures today are regularly exposed to dangerous and sophisticated attacks by hackers. With the growing number of attacks, the technological maturity of the attack methods used increases: Emotet, WannaCry, Locky, DDOS attacks or Zip bombs repeatedly threaten companies and authorities, and in many cases cause considerable damage. Read more
NoSpamProxy
Categories
Latest News
- Limited availability of our support on Thursday, September 5, 202403.09.2024 - 15:39
- How to spot phishing mails03.09.2024 - 10:00
- CAA records for S/MIME certificates will be verified from September 202426.08.2024 - 15:40