credit-cards

Target Data Breach: The Losses Mount on Many Fronts

The losses due the Target data breach are just beginning to be tabulated. According to financial results for the 4th Quarter, Target’s total loss for the period directly attributable to last year’s huge card holder data breach was $61 million,…

contentverification

Content Verification Certificates and Why You Need Them

Content Verification Certificates (CVC) facilitate the verification of “web page content”, the essential requirement for trusted e-commerce services that are now being attacked with increasing frequency by ever more convincing web page spoofs and Phishing attempts. Now a billion dollar…

man in the middle - small

Stay Away from the Man in the Middle

When you were a kid, presuming that you have indeed grown up, did you ever play the game “Man in the Middle”? That is where two players play a game of catch with a large ball, but they must throw…

coins decline - small

Has the Bitcoin Bubble Burst?

Owners of Bitcoins and fans of the virtual currency are reeling today on the news of the collapse of the largest Bitcoin exchange and a sharp decline in the value of Bitcoins on other exchanges. Trading has been halted on…

ucc

Can you benefit from UC Certificates?

Looking to save money on SSL and use Microsoft Exchange? Unified Communications SSL Certificates or Exchange SSL were created specifically for the Microsoft Exchange and/or Microsoft Office Communication Server environments.Comodo is one of the Internet’s only providers of UC SSL…

mouse on ice

HVAC Connection to Target Data Breach “Chilling”

Could a breach at a HVAC company specializing in supermarket refrigeration have led to the Target Data breach? Apparently so, according to mega retailer Target and Pennsylvania based Fazio Mechanical Services. This raises a “chilling” possibility that hackers are even…

trust assurance-small

Whitepaper: Identity and Trust Assurance Technologies

Trust is the currency of the internet. Without it, communication, commerce or collaboration cannot take place. How do we know? Because 21% of internet visitors won’t shop online at all! And many more shop on only a few, very large…

success-small

Case Study: Combating Zero Day Threats

Jean had a problem, she was managing over 200 endpoints and had no visual way to distinguish what devices were compliant, or even worse, had malware. To complicate matters, her current endpoint manager used antiquated black listing technology that left…

high class shoppers - small

Neiman Marcus Breach: Should Not Be Overshadowed By Target Breach

The recent data breach at the luxury specialty retailer Neiman Marcus has been overshadowed the mega data breach agt the retailing giant Target. However, it is nothing to sneeze at. With 1.1 million debit and credit cards compromised the consequences…

google plus hack

Google+ Hacked: Local Hotel Listings Hijacked

There are two things I‘ve learned for sure from studying internet security issues: Anyone can be hacked and hackers always have something new up their devious sleeves. The news that Google+ has been breached is a case in point. Yesterday,…

Page 5 of 9« First...34567...Last »