
In this blog post, we highlight the most important updates from Q1 2018. For a comprehensive list of new features and improvements, please visit the changelog in our knowledgebase. Continue reading

In this blog post, we highlight the most important updates from Q1 2018. For a comprehensive list of new features and improvements, please visit the changelog in our knowledgebase. Continue reading

At SpamExperts we are pleased to announce the release of a new feature for business email continuity. We have recently made it possible to send and reply to emails directly via the web interface when the destination server is down or unreachable, and there’s an urgent matter to attend related to an incoming message. Continue reading

Datacenters and web hosting companies are facing challenges in today’s market, where their entire IP space may get a bad reputation resulting in email from their networks being blocked by recipients. In response, email security vendors often are asked for providing a transparent filtering solution to scan all outgoing email from their unmanaged (hardware/virtual) servers.

The first months of 2016 have passed, and we’ve been relentlessly fighting off spam, phishing, and other threats. During this time, our email security software has undergone a number of important upgrades.

In the past few months our filters have noticed a considerable spike in spam and phishing campaigns using various techniques to cloak malware in email attachments. As always, taking proactive measures is one of the best ways to protect against such attacks that try to trick attachment scanning technologies.

DKIM, also known as DomainKeys Identified Mail, is an email anti-spoofing method that authorizes a domain to sign emails via cryptographic authentication.

Encryption has been around for many years, in many forms, and has increased the security of stored and transmitted data ever since. Emails are no different when it comes to security.

The Sender Policy Framework (SPF) is seen as a simple anti-email spoofing mechanism that checks if the sending server has been authorized by the domain’s administrators to send email.

Email is known as an exploitable vector for spreading malware due to its ability to send spam and phishing that tricks users into installing malicious software on their computers or worse, pose real threats for companies and critical infrastructure.