Beware Your Inbox! Government Reports New Email Phishing Scams

One of the most dangerous places on earth maybe your email inbox, considering the number of sophisticated email scams underway. Homeland Security is alerting computer…

Sandboxing is Nice. Auto-Sandboxing is Essential

The problem with conventional antivirus software is that they are like a bomb disposal unit that has not yet figured out where the bomb is.…

FireFox 35 Fixes Critical Security Flaws , Adds Chat Feature

This week Mozilla addressed 3 critical security vulnerabilities in the release of Firefox 35 this week. Firefox 35 also includes some interesting new features such…

Online Privacy and Security Concerns in an Age of Terror

Once again, terror is in the news and dominates much of the national discussion. A major European city, the great City of Lights, was brought…

OpenSSL Security Update Patches Denial of Service Vulnerability

OpenSSL has released updates patching eight vulnerabilities, one of which may allow an attacker to cause a Denial of Service condition. The OpenSSL security update…

Comodo Introduces Korugan Unified Threat Management

Comodo now provides one stop network and endpoint protection with the Korugan Unified Threat Management appliances. Korugan UTM integrates state of the art network firewall…

2014 In Review: Comodo Takes Lead in Threat Containerization!

2014 was a momentous year for Comodo, with a host of innovations and new product introductions. If we were to sum it up in one…

Study: Americans Believe They Have Lost Control of Privacy

The Pew Research Institute released a study recently that shows that over 91% of Americans believe that consumers have lost control of their privacy. This…

The Twelve Days of a Comodo Christmas

The 12 Days of a Comodo Christmas On the first day of Christmas Comodo gave to me, a secure browser in a sandbox On the…

Apple Fix

Apple Issues Critical OS X Security Updates

Apple has released critical security updates for OS X Mountain Lion, Mavericks, and Yosemite to address multiple vulnerabilities in the Network Time Protocol daemon. Exploitation…

Page 20 of 61« First...10...1819202122...304050...Last »