Comodo, as a matter of company policy, supports education in the United States and provides our security products at reduced rates to meet their security needs. In recent years, Comodo’s presence in educational systems has grown significantly. Licking R-VIII School Dis...
When we released Comodo Endpoint Security 3.0 in February 2013, we believed that its groundbreaking features would make it a popular solution for business and organizations struggling to manage their network devices. The results of this year’s WindowsSecurity.com Reader...
Flags that signal the risk of identity theft include suspicious activity indicating that identity thieves may be using stolen information. For example, names, Social Security numbers, account numbers, and birth dates to open new accounts or raid existing ones. Under the Red...
The case for a containment strategy to defend against malware grew even stronger this week with reports that hackers are using vulnerabilities in Microsoft’s Silverlight animation plug-in to deliver malware. In recent years, numerous exploits found in Adobe Flash and Java ha...
Microsoft Internet Explorer 8 contains a use-after-free vulnerability that can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. By convincing a user to view a malicious a web page or an HTML email message or attachment, an attacker m...
eBay Inc. issued a public statement today asking customers to change their web site passwords due to a breach of their customer database systems. Although they assert that the number of customer accounts compromised is small, and there is no evidence that the stolen data has...
According to a new report by the Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), public facing control systems often have weak internet security and are inviting targets for hackers. The report cites two incidents of hacking, includin...
The so called cyberwar between the US and China is about to take an interesting turn that could have significant consequences for one of the world’s most important strategic and economic relationships. The global and border less nature of the Internet makes it difficult to h...
Improving privacy and security while browsing has been a major objective for Comodo in recent product releases and enhancements, and a Senate subcommittee report yesterday highlights the need. The report warns of the dangers of malicious advertising, so called malvertising,...
We would never advise using an unsupported operating system. Everytime Microsoft issues a security patch for its supported OSs, it provides information that hackers can analyze and exploit against the unpatched Windows XP. However, one month after the end of Microsoft’s sup...