Google Search May Favor SSL

Should Google favor sites with SSL in their search results? Matt Cutts thinks so. He is the very public head of Google’s Webspam team and…

Case Study: Zamborg.com Needs Help Assuring E-Commerce

  Business Challenge Many customers who are interested in buying a product off a new website feel unsure about the website’s authenticity. They worry that…

SSL Validation Methods: Not all CAs are the Same

When obtaining an SSL Certificate, the Certificate Authority (CA) performs a verification of the requesting organizations identity that will vary depending on the level of…

Heartbleed Bug: Comodo Urges OpenSSL Users to Apply Patch

In response to a reported vulnerability in the popular OpenSSL cryptographic library, Comodo is urging its customer, partners and all users of OpenSSL to apply…

Comodo AV Labs Identifies Dangerous Zeus Banking Trojan Variant

Comodo Antivirus Labs has identified a new and extremely dangerous variant of the Zeus banking Trojan. Hackers use Zeus to launch attacks that obtain the…

What are Chained (Intermediate) Certificates?

As well as issuing SSL Certificate, a Trusted Root CA certificate can also be used to create another certificate, which in turn will then be…

When It Comes to Reliability, Comodo Passes the Test!

Recently, we reviewed a document of best practices in deploying SSL Certificates published by Qualys, a prominent security company.  Their document had some very good…

Target Data Breach: PCI DSS Auditor in Lawyer’s Crosshairs

Retailers who accept credit cards must periodically demonstrate that they are in compliance the Payment Card Industry Data Security Standards (PCI DSS). Large retailers are…

Why is SSL Certificate Browser Compatibility so Important?

SSL Certificates will only be recognized by a browser if the Root Certificate of the CA is present within the “trusted Root Certificates” store of…

Authentication Solutions: Beyond the Password

Authentication solutions prevent fraudulent account access risks. They also enable compliance with many security, banking and privacy regulations. What is Authentication? Authentication describes the verification…

Page 4 of 9« First...23456...Last »