Video Screencast Help

Authentication Services

Results for Authentication Services

  Today's headlines screamed   2 million Facebook, Gmail and Twitter passwords stolen in massive hack .  Again !!    The gory details are in the article. But essentially it is the same story of harvesting passwords using key logging ...
Blog Entry by Amit Chakrabarty | 05 Dec 2013 | 6 comments
As we wrote in our previous blog The Middle East and North Africa (MENA) region is basking in the joys of booming economic growth. These are exciting times however, that said, such success also has its downsides. While e-commerce is on a rapid ...
Blog Entry by Amer Sethi | 04 Dec 2013 | 0 comments
can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. ...
Blog Entry by captain jack sparrow | 03 Dec 2013 | 0 comments
In our constant endeavor to provide a better experience for our customers, we are in the process of updating our Certificate Revocation List (CRL) and Online Certificate Status Protocol (OCSP) infrastructure. The upgrade for CRL lists has been ...
Blog Entry by DomSYMC | 02 Dec 2013 | 3 comments
In the past year we have seen a number of security related stories in the Finnish media. Spring saw one of the Nordic region's largest banks forget  to renew the SSL certificate that secured their new online banking site. This unfortunately is ...
Blog Entry by Aija Pekkarinen | 10 Dec 2013 | 0 comments
I need a solution Hi,   It is possible to run LDAP Sync only for one "user store" ? Currently we have few "user stores" configured on Enterprise Gateway, ...
Forum Discussion by Mario_5 | 21 Nov 2013 | 1 comment
This blog post is based on the ‘Knowledge is Power: Symantec Guide to Protecting your Website’ whitepaper which is free to download now . In 2012 Symantec performed more than 1,400 website vulnerability scans each day. More than half the websites ...
Blog Entry by Jimmy Edge | 27 Nov 2013 | 0 comments
This blog post is based on the new Symantec Website Security Solutions free white paper, The Power to Destroy: How Malware Works which pulls together statistics from across Symantec’s global security network. The white paper is available in ...
Blog Entry by Jimmy Edge | 18 Nov 2013 | 0 comments
While we rush online to buy gifts for our nearest and dearest, scammers are looking to make their wage from your online mistakes. Learn how to stay safe online while doing your Christmas shopping this holiday season. ‘I’m dreaming of a safe holiday ...
Blog Entry by Andy Horbury | 08 Nov 2013 | 0 comments
For anyone intent on finding out exactly what the worldwide impact of cybercrime is now – and the price we are all paying as it penetrates every corner of the global markets – there can be no better starting point than the 2013 Norton Cybercrime Report ...
Blog Entry by Andy Horbury | 05 Nov 2013 | 0 comments