TMG Forefront 2010: Re-enabling Configuration Change Tracking Description

If you check the box Do not show this prompt again you will, of course, not be prompted to enter descriptions for applied changes in the future. If you later decide you’d like to have this feature back, highlight the Troubleshooting node in the navigation tree and select the Change Tracking tab in the main window. In the Tasks pane click Configure Change Tracking and check … Continue reading TMG Forefront 2010: Re-enabling Configuration Change Tracking Description

What Are Email Vulnerabilities And How Can We Secure Our Email Account

E-mail is one of the most widely used Internet services today. The services which are generally used in the e-mail Infrastructure are Simple Mail Transfer Protocol (SMTP) and Post Office Protocol version 3 (POP3) or Internet Message Access Protocol (IMAP). The client communicates with e-mail server through Simple Mail Transfer Protocol (SMTP) and retrieves a … Continue reading What Are Email Vulnerabilities And How Can We Secure Our Email Account

Symantec ProxySG: Error: NET::ERR_CERT_COMMON_NAME_INVALID when accessing secure web sites via ProxySG or ASG

Affected Products Chrome browser version 58 and later, and: accessing secure websites hosted behind a ProxySG (reverse proxy) or accessing other websites through a ProxySG or ASG where redirect-mode authentication is performed over SSL or accessing the management console, via any version of the ProxySG or Advanced Secure Gateway (ASG). Overview The latest versions of … Continue reading Symantec ProxySG: Error: NET::ERR_CERT_COMMON_NAME_INVALID when accessing secure web sites via ProxySG or ASG

Infographics: Targeted victim – Spearphishing Attack

SPEAR-PHISHING Spear-phishing is a targeted attempt to steal sensitive information such as account credentials or financial information from a specific victim, often for malicious reasons. This is achieved by acquiring personal details on the victim such as their friends, hometown, employer, locations they frequent, and what they have recently bought online. The attackers then disguise … Continue reading Infographics: Targeted victim – Spearphishing Attack

Infographics: Most Common Forms of Phishing Attacks

Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy entity in an electronic communication. Bad guys are trying to phish in more than more ways to get the information they want. The core takeaway is be careful on what to entertain (whether … Continue reading Infographics: Most Common Forms of Phishing Attacks