Affected Products Chrome browser version 58 and later, and: accessing secure websites hosted behind a ProxySG (reverse proxy) or accessing other websites through a ProxySG or ASG where redirect-mode authentication is performed over SSL or accessing the management console, via any version of the ProxySG or Advanced Secure Gateway (ASG). Overview The latest versions of … Continue reading Symantec ProxySG: Error: NET::ERR_CERT_COMMON_NAME_INVALID when accessing secure web sites via ProxySG or ASG
Over the past few years, podcasts have grown from ‘no-view’ to ‘go-to’ for both news and information, whilst we are plugged in and on the move, we have the time to listen but not to look at our sources of data. Cybersecurity and Information Security podcasts haven’t exactly been a driving force in the surge … Continue reading Cybersecurity Podcasts
There is no excerpt because this is a protected post.
SPEAR-PHISHING Spear-phishing is a targeted attempt to steal sensitive information such as account credentials or financial information from a specific victim, often for malicious reasons. This is achieved by acquiring personal details on the victim such as their friends, hometown, employer, locations they frequent, and what they have recently bought online. The attackers then disguise … Continue reading Infographics: Targeted victim – Spearphishing Attack
Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy entity in an electronic communication. Bad guys are trying to phish in more than more ways to get the information they want. The core takeaway is be careful on what to entertain (whether … Continue reading Infographics: Most Common Forms of Phishing Attacks
A basic graphical explanation on how end-to-end encryption works.
Sharing the series of Infographics I have kept on my haul
Enforce TLS to a partner organization. You can create connectors to apply security restrictions to mail exchanges with a partner organization or service provider. A partner can be an organization you do business with, such as a bank. It can also be a third-party cloud service that provides services such as archiving, anti-spam, and filtering. … Continue reading Set up connectors for secure mail flow with a partner organization
Sharing some cool stuff: A secured, private (and faster!) DNS queries via Cloudflare On your Android or IOS device, go to https://184.108.40.206 and download the app. On the app, switch to "Connected" and that's it. You are now using a secured DNS. Adds a level of security and privacy to your queries. Be aware that it wont … Continue reading Introducing 220.127.116.11: A Secured DNS Resolver