We are increasingly surrounded by artificial intelligence (AI). Autonomous driving or automatic facial recognition are just two popular examples of how AI is changing our everyday lives. IT security is also on the verge of upheaval, as AI has enormous potential for defending against cyber attacks. The attackers do not rest and use AI to optimise their attacks. Despite all the hype, however, it is often overlooked that users today can already benefit from conventional functionalities that are on a par with AI-supported technologies. Read more
Digital transformation is the shift towards modern workplaces that respond to technological progress and the realities of people’s lives. However, this shift to cloud-based work should not be at the expense of security or data protection – especially in view of the fact that emails are still the most important gateway for cyber attacks. What can Office 365 do to secure email traffic and protect your business from spam and malware?
For months we have been reading about increasingly sophisticated attacks on companies. With every new wave, we are amazed to discover that a particular virus or trojan is especially dangerous and clever. The programmer of the malware may even award himself or herself a medal if the German BSI issues a report or a news report mentions the attack.
Criminals have recently launched a wave of email attacks targeting industrial AutoCAD files. The focus is on companies in the renewable energy and automotive sectors. Industrial espionage thus reaches an unprecedented scale.
In phishing emails, criminals sometimes pretend to be financial institutions, sometimes online shops, sometimes lottery organisations, and sometimes even your boss. Add to this a faithfully recreated email and website design, and suddenly there is a great danger of a successful phishing attack. So how is it possible to identify a phishing attack? With our overview of the characteristics of phishing emails, you can now detect any attempt at fraud and learn how to detect dangerous emails.
Ransomware such as Locky, WannaCry and GandCrab has been making headlines lately. Criminals use this type of malware to gain access to individual files or the entire computer. At the same time, they prevent access by the rightful owner by means of encryption. The owner is allowed access only after a ransom has been paid.
A new wave of spam emails and viruses is currently affecting IT systems around the world. Since early November 2018, fake invoices, bank account warnings and other forged documents containing malicious code in the form of banking trojan Emotet are being distributed.
The University of Rostock replaces Sophos and Vamsoft with the central email relay NoSpamProxy to ensure secure and uninterrupted email communication for more than 16,500 users. With NoSpamProxy Protection, students and staff avoid spam and malware as completely as technically possible.