education - Copy

Educational Institutions Turn to Comodo for Security

Comodo, as a matter of company policy, supports education in the United States and provides our security products at reduced rates to meet their security needs. In recent years, Comodo’s presence in educational systems has grown significantly. Licking R-VIII School…

WS_ReadersChoice_1Runnerup-featured

WindowSecurity.com: Comodo ESM Reader’s Choice 1st Runner-up

When we released Comodo Endpoint Security 3.0 in February 2013, we believed that its groundbreaking features would make it a popular solution for business and organizations struggling to manage their network devices. The results of this year’s WindowsSecurity.com Reader’s choice…

red flag

Red Flag Rules on Identity Theft: Are You Compliant?

Flags that signal the risk of identity theft include suspicious activity indicating that identity thieves may be using stolen information. For example, names, Social Security numbers, account numbers, and birth dates to open new accounts or raid existing ones. Under…

winbug

Hackers Target Silverlight to Deliver Malware

The case for a containment strategy to defend against malware grew even stronger this week with reports that hackers are using vulnerabilities in Microsoft’s Silverlight animation plug-in to deliver malware. In recent years, numerous exploits found in Adobe Flash and…

winbug

Microsoft Internet Explorer 8 Vulnerability Requires Upgrade

Microsoft Internet Explorer 8 contains a use-after-free vulnerability that can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. By convincing a user to view a malicious a web page or an HTML email message or…

YOU B HACKED - Copy

Customer Data Breach: eBay Joins a Growing List of Hacked Companies

eBay Inc. issued a public statement today asking customers to change their web site passwords due to a breach of their customer database systems. Although they assert that the number of customer accounts compromised is small, and there is no…

us-cert-hs

Homeland Security Reports Hacked Infrastructure with Weak Security

According to a new report by the Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), public facing control systems often have weak internet security and are inviting targets for hackers. The report cites two incidents of hacking, including…

justice

Cyberwar: US to Battle Chinese Military in Court

The so called cyberwar between the US and China is about to take an interesting turn that could have significant consequences for one of the world’s most important strategic and economic relationships. The global and border less nature of the…

us capitol

Senate Report Exposes Dangers of Online Advertising and Malvertising

Improving privacy and security while browsing has been a major objective for Comodo in recent product releases and enhancements, and a Senate subcommittee report yesterday highlights the need. The report warns of the dangers of malicious advertising, so called malvertising,…

default_800x600_windows_xp_wallpaper-small

Still on XP? Here is Some Advice

We would never advise using an unsupported operating system. Everytime Microsoft issues a security patch for its supported OSs, it provides information that hackers can analyze and exploit against the unpatched Windows XP.  However, one month after the end of…

Page 30 of 58« First...1020...2829303132...4050...Last »