Many e-Commerce sites display “Trust Seals”, aka Trust Mark Logos, provided by third parties who have conducted an independent audit of the site or its ownership. The concept did not start with the web era. It is essentially the same as the “Good Housekeeping Seal of Approva...
If a person is arrested for a routine traffic violation and has a personal computer conceal in their car trunk and a smartphone in their pocket, the police have no legal right to search their computer because it is considered protected under the 4th Amendments’ prohibition o...
SANDBOX BROWSING PROTECTS AGAINST ZERO DAY EXPLOITS. On April 26th, Microsoft revealed that hackers are exploiting a critical vulnerability in their Internet Explorer browser to victimize users with so called “drive by download” attacks. Such attacks download and execute mal...
Identity theft is at a record high, and a significant number of identity theft cases are traced back to spyware. Spyware is a type of malicious software (also called malware) that hackers use to invade unsecured computers and networks. It is typically downloaded inadvertentl...
At Comodo, we were pleased and proud to learn that our CEO Melih Abdulhayoğlu has been named #6 on a list of “The Most Influential Turkish Americans” in the April 23rd edition of Turk of America Magazine. This was not the first time Melih was recognized by Turk of America. ...
Mozilla is making its Firefox browser SSL verification stronger, and asking for help in making sure it works. Mozilla will pay $10,000 for critical vulnerabilities found in its new code. Mozilla will reward identifying bugs that allow the construction of certificate chains t...
How can conventional antivirus scanners deal with a tidal wave of new malware each day? The short answer is – they can’t. Independent tester AV-Test Labs recently estimated that there are up to 55,000 new malware variants released into the wild each day. Other security...
Over the past 6 months US retailers and American consumers have been rocked by a string of high profile Point of Sale System card data breaches, starting with the massive breach at Target last December. Now, the retail arts & crafts supplier Michaels Stores and their cus...
Should Google favor sites with SSL in their search results? Matt Cutts thinks so. He is the very public head of Google’s Webspam team and works on search engine optimization issues. In recent weeks, Cutts has expressed his opinion at various conferences and public settings t...
Phishing is associated with fraudulent activities and stealing personal information on web. The sensitive information including passwords, ID and details of credit cards are acquired by the process of phishing. This kind of ID theft takes place through electronic communicati...