Phishing Angriffe vermeiden mit Senderreputation

Phishing emails enable scammers to capture relevant data from affected companies. Phishing attacks can be fended off by the possibilities of sender reputation management. Stefan Cink, NoSpamProxy product manager, explains how administrators can protect their company against phishing emails in an article released in the IT-Administrator magazine.

Read more

Icon update rot

NoSpamProxy 12.2 and Open Keys simplify key retrieval for email encryption

Among the most important new features of version 12.2 is the complete integration of Open Keys for easy querying and publishing of public keys. Open Keys is a product- and vendor-neutral service that aggregates many different key servers and thus represents a significant simplification for encrypted e-mail traffic. Open Keys offers users a central platform for querying and uploading public keys.

Read more

E-Mail Verschlüsselung mit der Initiative "Mittelstand verschlüsselt!" - einfach, günstig, sicher, für jeden

The Digitale Strategie 2025 (Digital Strategy 2025) released by the Federal Office for Economic Affairs and Energy (BMWi) supports small and medium-sized businesses in improving data security. Tool-supported email encryption as an extension of conventional email servers is particularly mentioned as one of the required measures. In this regard, the Kompass für IT-Verschlüsselung (IT encryption compass) emphasizes high usability of future-proof, gateway-based solutions.

Read more

Gandcrab Trojaner

Ransomware such as Locky, WannaCry and GandCrab has been making headlines lately. Criminals use this type of malware to gain access to individual files or the entire computer. At the same time, they prevent access by the rightful owner by means of encryption. The owner is allowed access only after a ransom has been paid.

Read more

Welche Möglichkeiten der E-Mail-Verschlüsselung gibt es?

Emails are a common part of our private and professional communication. However, there seems to be no awareness of the vulnerability of each individual email sent. In many cases, emails travel across a variety of servers and countries, regardless of whether the recipient lives on a different continent or just on a different floor in the same building. The structure of the internet makes this possible.

As a result, anyone with the neccessary technical knowledge can intercept, read or even change emails at any node during transport. And he or she can write emails in your name.

Read more

Virus Bulletin Zertifikat NoSpamProxy

From a possible 100 points, NoSpamProxy achieves a dream result with 99,99 points and receives the title VB Spam + Gold from the renowned IT security certification institute Virus Bulletin.

Read more

Wie sicher ist E-Mail-Verschlüsselung?

The #Efail debate has caused great uncertainty among users and IT departments regarding the effectiveness of email encryption. Headlines such as S/MIME and PGP hacked were not only factually incorrect, but also led some self-proclaimed experts to advise against the use email encryption in general. The fact that the problem is not S/MIME or PGP itself was completely ignored. In reality, encryption is bypassed by getting the email client to send the plain text of the email to the attacker.

Read more

Icon Makefg

The research team at Net at Work GmbH has discovered a particularly perfidious form of a phishing or malware attack.

Read more