Protecting yourself against losing important things you need

For many of us, our computer is the place we store many of life’s most important documents, as well as precious family photos, music collections, and a lot more. But while the computer has many wonderful advantages, it also has…

ransomware

Protecting yourself when you’re out with your laptop, Blackberry etc

Today, we’re always on the go. For business and pleasure. And millions of us take a laptop, Blackberry or another wireless device with us. To airports, hotels, coffee shops, or just out onto our back patio. Once there, it’s easy…

Protecting yourself when you’re browsing, buying or messaging

The Internet is rapidly becoming the world’s No.1 communications medium. Literally hundreds of millions of people are on the Web every day. But not everyone and everything there is harmless. Armies of cyber-crooks prowl the Web, too. Along with more…

Protect yourself from those annoying problems we all experience

These days, most people find themselves working on their computers or visiting the Web nearly every day. Still, few of us find the time to become very savvy or proficient. Which is the single biggest reason why we experience frozen…

Every 12 Seconds a Laptop is Lost or Stolen!

One of the largest security breaches is a laptop that is lost or stolen, yet laptops which store confidential business data are the least protected by IT personnel.

WhiteHouse_Logo - Copy

White House Reveals CyberSecurity Plans

Devious CyberSecurity breaches are among the most serious criminal threats facing the country today. Howard Schmidt, America’s CyberSecurity Czar pointed this out at the RSA conference, reiterating a point President Obama first stated almost a year ago. The initiative that…

Best Defense Strategy: Layered Protection & Centralized Mgmt

Managing Endpoint Security has become more complicated for IT personnel. Trends indicate that endpoint security is only going to get more complex as time goes on. Malware threats continue to become more sophisticated and the motive of attackers has become…

CyberSecurity Just Got Stronger, Thanks to Comodo

Comodo Internet Security 4.0 is even more technologically advanced than ever before. 4.0 comes not only with Comodo’s award-winning Firewall, but also with our Defense+ HIPS and Advanced Antivirus components, that are further enhanced by our unique Sandbox and White…

Enhancements Made to Comodo’s eMerchant Site Security Scanning Tool

We’ve made PCI Scanning easier. Why? Because we know PCI Scanning is a frustrating task for the IT department of any company that must allow credit card transactions. Especially if your company stores those credit card numbers Nobody is happy…

thin ice

Malicious Threats Present A Growing Risk For Internet Users

The amount of malware not detected by most PC Security software is increasing. This represents a heightened risk for Internet users. In March 2010, VirusTotal.com, a service that analyses suspicious files, identified more than 70,000 infected files that went undetected…

Page 57 of 58« First...102030...5455565758