A wave of email attacks is currently spreading around the world, with the attackers abusing the communication partners’ Exchange servers to send the fake emails. This article explains why this is so dangerous and what you can do now.
In phishing attacks, criminals repeatedly focus on bank customers in order to obtain sensitive data. Recently, there has been an increase in attacks on the customers of financial institutions. In his blog www.msxfaq.de, Frank Carius takes a closer look at some of the current spam mails. He shows how to recognise the phishing emails and which banks need to catch up on the topic of email security.
Business Email Compromise (BEC) is a scam through which criminals repeatedly manage to tap sensitive data or trigger financial transactions. Recurring dates such as the turn of the year or global events such as the Corona pandemic serve as a template for the fraudsters to get employees to transfer money to their account or disclose data. We explain why Business Email Compromise (BEC) is so dangerous and what you can do about it.
With the rapid development in the field of artificial intelligence, the field of IT security is facing great challenges: Like any new technology, artificial intelligence and so-called machine learning can be abused by criminals. What this means for the fight against phishing, ransomware and spam, and how you can already protect yourself against them, we explain in this blog article.
Criminals are always finding new ways to distribute malware, and the battle against attacks from the internet is continuously fought. Sometimes the good guys win, but no sooner is one threat defused than the next one pops up. Not only that: ransomware attacks are increasing dramatically. In the current case, the attacks are using XLL files, which are used to install malware on the victims’ computers. What XLL files are, why they are so dangerous and how NoSpamProxy protects you from this threat, you will learn in this blog article.
In the fifth part of our series on sender reputation, we explain how you can use DNS-based Authentication of Named Entities (DANE) to ensure the authenticity of certificates and protect your email traffic from access by criminals.
In the fourth part of our series of articles on sender reputation, we show you how you can use Domain-based Message Authentication, Reporting and Conformance (DMARC) to determine how the receiving server should authenticate your emails and what it should do if authentication fails. In addition, we explain how you can use DMARC to quickly be informed about abuse of your domain and thus protect the reputation of your domain.
Short URL services such as bit.ly are consistently used by criminals to get phishing links past email security solutions and onto their victims’ computers. In this article, we show you how short URLs are used as part of spam campaigns and why 32Guards and its dedicated web crawler offer ideal protection against attacks.
NoSpamProxy
Categories
Latest News
- NoSpamProxy Server 15.1 now available24.04.2024 - 15:38
- Deactivation of the knowledge base: What you need to do now23.04.2024 - 10:00