Die Zeit für echte E-Mail-Firewalls ist gekommen

For months we have been reading about increasingly sophisticated attacks on companies. With every new wave, we are amazed to discover that a particular virus or trojan is especially dangerous and clever. The programmer of the malware may even award himself or herself a medal if the German BSI issues a report or a news report mentions the attack.

Read more

blank

Criminals have recently launched a wave of email attacks targeting industrial AutoCAD files. The focus is on companies in the renewable energy and automotive sectors. Industrial espionage thus reaches an unprecedented scale.

Read more

How to Identify Phishing Emails

In phishing emails, criminals sometimes pretend to be financial institutions, sometimes online shops, sometimes lottery organisations, and sometimes even your boss. Add to this a faithfully recreated email and website design, and suddenly there is a great danger of a successful phishing attack. So how is it possible to identify a phishing attack? With our overview of the characteristics of phishing emails, you can now detect any attempt at fraud and learn how to detect dangerous emails.

Read more

Gandcrab Trojaner

Ransomware such as Locky, WannaCry and GandCrab has been making headlines lately. Criminals use this type of malware to gain access to individual files or the entire computer. At the same time, they prevent access by the rightful owner by means of encryption. The owner is allowed access only after a ransom has been paid.

Read more

Universitaet_Rostock_NoSpamProxy

The University of Rostock replaces Sophos and Vamsoft with the central email relay NoSpamProxy to ensure secure and uninterrupted email communication for more than 16,500 users. With NoSpamProxy Protection, students and staff avoid spam and malware as completely as technically possible.

Read more

Phishing Angriffe vermeiden mit Senderreputation

Phishing emails enable scammers to capture relevant data from affected companies. Phishing attacks can be fended off by the possibilities of sender reputation management. Stefan Cink, NoSpamProxy product manager, explains how administrators can protect their company against phishing emails in an article released in the IT-Administrator magazine.

Read more

Icon Makefg

Similar to Microsoft Exchange, some NoSpamProxy features can only be enabled through a PowerShell cmdlet. Specifying an “SPF-authenticated corporate email server” is one such feature. Entries of this kind facilitate the maintenance of NoSpamProxy enormously. “Corporate email servers” define the servers of a company that are allowed to use owned domains in email sender addresses. By default, IP addresses, subnets, host names, TLS-authenticated hosts, and Office 365 tenants can be specified.

Read more

Cyber attacken abwehren mit NoSpamProxy

In the case of the so-called Bundeshack, attackers, most likely from Russia, recently carried out a cyber attack on the German Federal Foreign Office. The perpetrators captured small amounts of data and only a single-digit number of documents. As far as is currently known, a total of 17 computers were affected by the malware attack. 

The Süddeutsche Zeitung yesterday published new details on the cyber attack on the German government . Would it have been possible to fend off the cyber attack?

Read more