SHA-1 Description

SSL 101: How Do I Get a Secured Connection?

The Secure Sockets Layer (SSL) allows you to communicate over the Internet with a secure and encrypted connection. SSL is probably most associated with web…

What Does a Data Breach Cost? Your Reputation

I was recently reviewing Verizon’s recently annual Data Breach Investigations Report for 2013, published earlier this year. It is must reading for anyone who has…

You Are Being Watched!

“You are being watched. The government has a secret system: a machine that spies on you every hour of every day.” This is from the…

Are You Protected From Your Frenemies?

We have the software to do a pretty good job of protecting ourselves from our digital enemies, the hackers who spread viruses and want to steal our…

Web Inspector: What e-Commerce Should Get for Christmas!

Comodo announced last week that our Web Inspector service now also uses the advanced malware detection technologies of their award winning Comodo Internet Security to…

NSA Grade Surveillance Software Being Sold to Private Companies

The controversy and privacy concerns over collecting big data still surrounds the national security agencies. While the NSA is a government project, a new report…

Not So Funny: Cracked Humor Site Serves Drive By Malware

Something funny was going on at the Cracked Humor web site recently, and many site visitors were not amused.Recently, the humor website Cracked.com became was…

PCI DATA SECURITY STANDARDS: BEYOND COMPLIANCE

There is an epidemic of identity theft that is costing businesses and consumers millions of dollars per year. Most of these incidents are the result…

TLS Encryption with Outdated Server Software Risky

Web servers that permit users to inject new negotiations into ongoing secure sessions may allow interlopers to inject themselves into encrypted Internet transmissions. A correctly-implemented…

GitHub Attack: Strong Passwords & 2-Factor Auth Critical

GitHub, the web hosting and code repository firm, is focusing attention on the importance of strong passwords for Internet security. You may have noticed that…

X