Ransomware such as Locky, WannaCry and GandCrab has been making headlines lately. Criminals use this type of malware to gain access to individual files or the entire computer. At the same time, they prevent access by the rightful owner by means of encryption. The owner is allowed access only after a ransom has been paid.
The University of Rostock replaces Sophos and Vamsoft with the central email relay NoSpamProxy to ensure secure and uninterrupted email communication for more than 16,500 users. With NoSpamProxy Protection, students and staff avoid spam and malware as completely as technically possible.
Phishing emails enable scammers to capture relevant data from affected companies. Phishing attacks can be fended off by the possibilities of sender reputation management. Stefan Cink, NoSpamProxy product manager, explains how administrators can protect their company against phishing emails in an article released in the IT-Administrator magazine.
From a possible 100 points, NoSpamProxy achieves a dream result with 99,99 points and receives the title VB Spam + Gold from the renowned IT security certification institute Virus Bulletin.
Similar to Microsoft Exchange, some NoSpamProxy features can only be enabled through a PowerShell cmdlet. Specifying an “SPF-authenticated corporate email server” is one such feature. Entries of this kind facilitate the maintenance of NoSpamProxy enormously. “Corporate email servers” define the servers of a company that are allowed to use owned domains in email sender addresses. By default, IP addresses, subnets, host names, TLS-authenticated hosts, and Office 365 tenants can be specified.
Last Thursday, the NoSpamProxy team held a workshop with the title “Catch me if you can” at the Vogel IT. In the special location of the RheinEnergie sation in cologne, Stefan Cink ,product manager for NoSpamProxy, demonstrated in real time how simple it is to fool customers, employees and leaders with simulated email addresses and to cause extensive financial damage.
In the case of the so-called Bundeshack, attackers, most likely from Russia, recently carried out a cyber attack on the German Federal Foreign Office. The perpetrators captured small amounts of data and only a single-digit number of documents. As far as is currently known, a total of 17 computers were affected by the malware attack.
The Süddeutsche Zeitung yesterday published new details on the cyber attack on the German government . Would it have been possible to fend off the cyber attack?