Target Data Breach: Should You Panic?

If you used a credit or debit card at a Target department store between November 27th and December 15th, your card data may have been…

Cheap SSL and High Quality: Not an Oxymoron at Comodo

We have a running debate here at Comodo as to whether to use “Low Cost SSL” or “Cheap SSL” in referring to our SSL Certificates.…

The Darkside of Internet Privacy: Tor and Chewbacca

In recent years, a combination of Onion routing and the Tor network have allowed users stay hidden with great internet privacy. This is appealing to…

Code Signing Certificates: Do Not Develop Software Without Them

Code signing certificates from a trusted certificate provider allow developers to digitally sign their software so that customers know the code has not been altered…

Browsing in the Sandbox: Its Time Has Come with Comodo

Hardly a day goes by where we don’t learn about a new exploit to a major system that hackers use to wreak havoc on web…

Bitcoins: Hackers Target Virtual Currency

Opinions on Bitcoin, the electronic payment method vary widely. To some, it represents no less than the dawning of a new age of individual empowerment…

Free APT Assessment: Are You Under Attack?

Historically, hackers have cast a wide net.  They put viruses into “the wild” and  where they end up nobody actually knows. The send out phishing…

Digital Email Certificates: Is Your Email Worth Protecting?

How important is your email communication? Would it be a problem if someone intercepted it? What if someone modified it before reaching the recipient or…

Ransomware Attacks

Kelhios: The Vampire of Botnets

A botnet, a network of unwillingly controlled computers, is sometimes called a Zombie network. That’s because, like “real zombies” the computer owners aren’t aware of what…

ZeuS Banking Trojan Is Back, Now in 64 Bit

It’s often said “What’s old is new again”. The well-known ZeuS banking trojan is back again, but this time it is being spread as a…

X