Since 7 June 2019, a warning about fake emails can be read on the website of the Federal Fiscal Court in Germany. According to the warning, previously unknown perpetrators send emails with malicious attachments and use the email domain of the Federal Fiscal Court in the sender. It goes without saying that the emails also look deceptively real. Although the Federal Fiscal Court’s warning is shared in the social media, the actual range is likely to be limited. The majority of the victims are informed – if at all – much too late. And this despite the fact that the DMARC specification is a freely available technology that could prevent this.
The new “No Spam Area” offers information and assistance on the topics of spam, malware and email security. It raises awareness of threats such as phishing, CxO fraud or Trojans, highlights effective countermeasures and assists in their concrete implementation.
For months we have been reading about increasingly sophisticated attacks on companies. With every new wave, we are amazed to discover that a particular virus or trojan is especially dangerous and clever. The programmer of the malware may even award himself or herself a medal if the German BSI issues a report or a news report mentions the attack.
Criminals have recently launched a wave of email attacks targeting industrial AutoCAD files. The focus is on companies in the renewable energy and automotive sectors. Industrial espionage thus reaches an unprecedented scale.
Sending large attachments by email can cause problems because images, videos or large documents often exceed the maximum file size allowed. This is becoming increasingly problematic because more and more data is generated every day. Countless image and multimedia files created using smartphone cameras are proof of this. Research shows that the average size of the files that users want to send as email attachments is growing from year to year. This puts a strain on corporate email infrastructures, resulting in bans on the sending of large files, the setting of limits or a case-by-case basis approval policy.
Similar to Microsoft Exchange, some NoSpamProxy features can only be enabled through a PowerShell cmdlet. Specifying an “SPF-authenticated corporate email server” is one such feature. Entries of this kind facilitate the maintenance of NoSpamProxy enormously. “Corporate email servers” define the servers of a company that are allowed to use owned domains in email sender addresses. By default, IP addresses, subnets, host names, TLS-authenticated hosts, and Office 365 tenants can be specified.
This new feature patch includes following changes:
A new update fixing some bugs has been released. We recommend all customers to apply this update. It can be found in our download section.