default_800x600_windows_xp_wallpaper-small

Still on XP? Here is Some Advice

We would never advise using an unsupported operating system. Everytime Microsoft issues a security patch for its supported OSs, it provides information that hackers can analyze and exploit against the unpatched Windows XP.  However, one month after the end of…

boing springs savings - Copy

Boiler Spring Savings Protects Customers with Comodo

Boiling Springs Savings Bank: Financial Institution introduces SVT technology that authenticates web content to protect critical customer information in online banking transactions. Background: Boiling Springs Savings Bank, named after the famed Boiling Springs in the Rutherford, New Jersey area, manages…

lock and gloab - Copy

Trusted Root Keys: Why they Matter

The growing use of the Internet for commerce, communication and collaboration has significantly increased the need for online security. Certification Authorities, who provide network, Internet and application security solutions for communicating and conducting business, are a key link in the…

zero-day vulnerability

Advanced Persistent Threats: Everyone is at Risk

You may think that cyber-attacks are someone else’s problem. You would be wrong. Cyber-attacks are growing in their number, sophistication and diversity of target. The 2013 Verizon report on data breaches made clear that we all need to be on…

Best Endpoint Protection Software

OPSWAT: Comodo Security is a Leading Networking & Tech Solution

OPSWAT is an independent security firm that provides certifications for security applications to verify that they are compatible with leading network and technology solutions. A high level of compatibility for security applications is important for home users and students, system…

Hacker

Comodo AV Labs Warns of Free for Sale Scam

Most of the malware created these days is designed to generate income to the malware authors. That’s not a surprise, but it is amazing how creative these digital criminals can be. At Comodo AV Labs we observe and analyze the…

spam

You’ve Got Spam: AOL Data Breach Tied to Wave of Phishing

The company that made the phrase “You’ve got mail” famous is now saying that if “you’ve got AOL mail” you better change your password and be on the lookout for trouble.. A flood of spam email from hackers that spoof…

secure_lock - Copy

The History of the SSL Certificate

The Secure Sockets Layer (SSL) Protocol was adopted by Netscape in 1994 as a response to the growing concern over Internet security. Netscape’s goal was to create an encrypted data path between a client and a server that was platform…

family-fund-img

UK’s Family Fund Fights Spam with Comodo Antispam Gateway

Family Fund is the UK’s largest provider of grants to low-income families raising disabled or seriously ill children and young people. Our relationship with Comodo began when we trialed and bought the Antispam Gateway to reduce the amount of unsolicited email we…

the law - small

Supreme Court: Is Seizing a Mobile Phone is Like Seizing a Computer?

If a person is arrested for a routine traffic violation and has a personal computer conceal in their car trunk and a smartphone in their pocket, the police have no legal right to search their computer because it is considered…

Page 30 of 57« First...1020...2829303132...4050...Last »