The Wayback Machine - https://web.archive.org/web/20140810204410/https://blogs.comodo.com/category/it-security/
google ssl

Google to Favor Sites With SSL in Ranking

Great news this week for SSL users from Google! The leading search engine is adjusting its famous and mysterious ranking algorithm to reward sites that use SSL. This means that users of SSL will not only get a secured connection to protect their communications with customers...

credit card

P.F. Chang Data Breach: New Details Emerge

On August 4th, P.F. Chang released a statement from CEO Rick Federico with new information about the data breach identified in June that compromised credit and debit card holder data of patrons of their American Chinese Bistro restaurants. Most significantly, the company now...

secureBoc_logo

EndPoint Security Gets a Boost with Comodo SecureBox

Comodo announced this week the latest addition to its portfolio of endpoint security products, Comodo SecureBox. SecureBox is a secure desktop application that enables users to safely interact with mission-critical applications on malware-infected devices, such as company co...

ID-100204119

Researcher IDs Vulnerabilities in Antivirus Software – Comodo Has the Solution

A researcher at the Singapore security firm COSEINC, Joxean Koret, is all over the technical news sites. He is being quoted almost everywhere, including on ComputerWorld and Inquire in the UK, about assertions that all of the major antivirus programs are vulnerable to attack...

shopping cart

eBay Data Breach: Class Action Suit Alleges Negligence

Data breaches that impact customers are costly in many ways. They are costly to cleanup. They are costly in the erosion of their customer’s confidence and business. They can kill e-Commerce. Increasingly, data breaches are costly in legal liabilities. The latest exampl...

cyber-attacks-ahead-small

Hackers, the Dark Side of the Tech Revolution

When I read about hackers and cyber criminals I often think of the old TV show Get Smart. After vanquishing a villain, Agent Maxwell Smart would often recite a lament that typically went “If only he had used his genius for good and niceness instead of evil.” If o...

hackers

Penetration vs Vulnerabilty Testing: Do You Know the Difference?

Every time you turn around, it seems there is another high profile data breach in the news that involves the compromise of cardholder data. The Target data breach alone may have compromised the data of more than half of all adult Americans. It has never been more important t...

firefox_live

Mozilla Releases Critical Security Updates for Firefox

The Mozilla has released security updates to address multiple vulnerabilities in their Firefox browser, including 11 critical fixes. Among the critical fixes is for a “use after free” bug. This is where a program referencing memory after it has been freed. This c...

sql vulnerability

vBulletin Announces Emergency Patch for SQL Injection Vulnerability

vBulletin Solutions announced this week that they have a critical emergency patch to their vBulletin forum software to fix an SQL injection vulnerability that could allow hackers to access the software’s databases. The vulnerability and fixes apply only vBulletin version 5....

heartbleed - Copy

Many Servers Vulnerable to Heartbleed. Act Now!

Various news reports have confirmed that many web servers are still vulnerable to the Heartbleed bug, which effects Apache servers running SSL. The bug was first reported early in April of this year. Oracle recently released a list of products affected by the Heartbleed Open...

Page 1 of 1012345...10...Last »