The Wayback Machine - https://web.archive.org/web/20140810225240/https://blogs.comodo.com/2014/06/
kitchen-refrigerator - robot

The Internet of Things: A Tech Dream or Internet Security Nightmare?

The Internet of Things (IoT) is a loose term for the concept that today’s computing and Internet technologies can be applied to almost any tool known to mankind, with results that were only the stuff of science fiction in the recent past. Science fiction frequently foc...

android briefcase

Google Shifts Focus of Android to the Enterprise

Google has signaled a shift in focus for its Android operating system toward’s the enterprise market with its new Android Work component, a feature of its upcoming mobile OS that provides mobile device management (MDM) features and IT controls to Android. This is in re...

mestre_kame_alert_red_icon - Copy

Alert! SpamTitan Users at Risk From Cross-site Scripting Vulnerability

According to Homeland Securities Computer Emergency Repsone Team (US-CERT) SpamTitan contains a reflected cross-site scripting (XSS) vulnerability. SpamTitan is a server system for monitoring email and reducing spam email and other threats. The vulnerability was found in the...

postit2

Should There be a Right to be Forgotten on the Web?

Google began complying this week with a European Court Ruling that recognizes an individual’s “Right to be Forgotten” online. The right to be forgotten is a concept that has been put into law in the European Union that supports the desire of an individual to ‘determine the d...

01_csqoiounge_com featured

Comodo AV Labs Identifies Phishing Scam Targeting Gamers

Contributors: Ionel Pomana, Kevin Judge Video games have played an important role in the history of computers and are a significant reason for their popularity as a consumer product. Families had video game players in their homes long before they had personal computers. The...

CARD SLIP - Copy

PF Chang Data Breach: More Questions than Answers

There are two disturbing bits of news this week regarding the recently revealed cardholder data breach at PF Chang, the national chain of Chinese casual dining restaurants. The first is that more than a week after the breach, they are still using manual imprint machines to p...

us-cert-hs

Homeland Security: Symantec Web Gateway Vulnerable

According to Homeland Security’s Computer Emergency Response Team (US-CERT), the Symantec Web Gateway contains SQL injection and cross-site scripting vulnerabilities. Symantec Web Gateway 5.1.1.24, and possibly earlier versions, contains a cross-site scripting vulnerability...

at&t device

AT&T Notifies Wireless Customers of Data Breach

The company whose logo used to be the cracked Liberty Bell has some crack’s in its own data security policies. AT&T sent out letters this week to its wireless customers this week informing them that an unspecified number of customers have had the personal information bre...

winbug

Microsoft Antivirus and Numerous Apps Impacted by Vulnerability

Microsoft revealed this week that a vulnerability in its Malware Protection Engine could allow an attacker to cause a denial of service. This software is an integral part of its free security software for Windows and is integrated into a variety of other software products. A...

mdm-main - Copy

Comodo Enhances its Mobile Device Management Platform

We Bring Superior Mobile Device Management to Your Business Comodo Mobile Device Management (CMDM) provides IT administrators with a rich set of capabilities to secure and manage large-scale deployments of corporate and personal mobile devices – all from a single console. CM...

Page 1 of 212