Künstliche Intelligenz

We are increasingly surrounded by artificial intelligence (AI). Autonomous driving or automatic facial recognition are just two popular examples of how AI is changing our everyday lives. IT security is also on the verge of upheaval, as AI has enormous potential for defending against cyber attacks. The attackers do not rest and use AI to optimise their attacks. Despite all the hype, however, it is often overlooked that users today can already benefit from conventional functionalities that are on a par with AI-supported technologies. Read more

E-Mail Security Office 365 Cloud

Digital transformation is the shift towards modern workplaces that respond to technological progress and the realities of people’s lives. However, this shift to cloud-based work should not be at the expense of security or data protection – especially in view of the fact that emails are still the most important gateway for cyber attacks. What can Office 365 do to secure email traffic and protect your business from spam and malware?

Read more

Criminals have recently launched a wave of email attacks targeting industrial AutoCAD files. The focus is on companies in the renewable energy and automotive sectors. Industrial espionage thus reaches an unprecedented scale.

Read more

Emotet Trojaner Schutz

A new wave of spam emails and viruses is currently affecting IT systems around the world. Since early November 2018, fake invoices, bank account warnings and other forged documents containing malicious code in the form of banking trojan Emotet are being distributed.

Read more

Die Zeit für echte E-Mail-Firewalls ist gekommen

For months we have been reading about increasingly sophisticated attacks on companies. With every new wave, we are amazed to discover that a particular virus or trojan is especially dangerous and clever. The programmer of the malware may even award himself or herself a medal if the German BSI issues a report or a news report mentions the attack.

Read more

Universitaet_Rostock_NoSpamProxy

The University of Rostock replaces Sophos and Vamsoft with the central email relay NoSpamProxy to ensure secure and uninterrupted email communication for more than 16,500 users. With NoSpamProxy Protection, students and staff avoid spam and malware as completely as technically possible.

Read more

How to Identify Phishing Emails

In phishing emails, criminals sometimes pretend to be financial institutions, sometimes online shops, sometimes lottery organisations, and sometimes even your boss. Add to this a faithfully recreated email and website design, and suddenly there is a great danger of a successful phishing attack. So how is it possible to identify a phishing attack? With our overview of the characteristics of phishing emails, you can now detect any attempt at fraud and learn how to detect dangerous emails.

Read more

Phishing Angriffe vermeiden mit Senderreputation

Phishing emails enable scammers to capture relevant data from affected companies. Phishing attacks can be fended off by the possibilities of sender reputation management. Stefan Cink, NoSpamProxy product manager, explains how administrators can protect their company against phishing emails in an article released in the IT-Administrator magazine.

Read more