The Wayback Machine - https://web.archive.org/web/20140810204407/https://blogs.comodo.com/2014/04/
lock-img

Trust Seals: E-Commerce Runs on Trust

Many e-Commerce sites display “Trust Seals”, aka Trust Mark Logos, provided by third parties who have conducted an independent audit of the site or its ownership. The concept did not start with the web era. It is essentially the same as the “Good Housekeeping Seal of Approva...

the law - small

Supreme Court to Decide if Seizing a Mobile Phone is Like Seizing a Computer

If a person is arrested for a routine traffic violation and has a personal computer conceal in their car trunk and a smartphone in their pocket, the police have no legal right to search their computer because it is considered protected under the 4th Amendments’ prohibition o...

winbug

New Vulnerability Threatens IE Users, Comodo Provides a Solution

SANDBOX BROWSING PROTECTS AGAINST ZERO DAY EXPLOITS. On April 26th, Microsoft revealed that hackers are exploiting a critical vulnerability in their Internet Explorer browser to victimize users with so called “drive by download” attacks. Such attacks download and execute mal...

Computer Security Pyramid - Copy

Fighting Spyware with a Firewall

Identity theft is at a record high, and a significant number of identity theft cases are traced back to spyware. Spyware is a type of malicious software (also called malware) that hackers use to invade unsecured computers and networks. It is typically downloaded inadvertentl...

37.sa kapak - Copy

Comodo CEO Named Among Most Influential Turkish Americans

At Comodo, we were pleased and proud to learn that our CEO Melih Abdulhayoğlu has been named #6 on a list of “The Most Influential Turkish Americans” in the April 23rd edition of Turk of America Magazine. This was not the first time Melih was recognized by Turk of America.  ...

firefox_live

Mozilla to Pay $10,000 for Bugs Found in New Firefox SSL Certification Verification

Mozilla is making its Firefox browser SSL verification stronger, and asking for help in making sure it works. Mozilla will pay $10,000 for critical vulnerabilities found in its new code. Mozilla will reward identifying bugs that allow the construction of certificate chains t...

Signposts - Copy

Understanding Containment: Malware Defense for the Real World

How can conventional antivirus scanners deal with a tidal wave of new malware each day? The short answer is – they can’t. Independent tester AV-Test Labs recently estimated that there are up to 55,000 new malware variants released into the wild each day. Other security...

cards and reader - Copy

Michaels Data Breach Effects 3 Million Cardholders

Over the past 6 months US retailers and American consumers have been rocked by a string of high profile Point of Sale System card data breaches, starting with the massive breach at Target last December. Now, the retail arts & crafts supplier Michaels Stores and their cus...

Time for Trust - Copy

Google Search May Favor SSL

Should Google favor sites with SSL in their search results? Matt Cutts thinks so. He is the very public head of Google’s Webspam team and works on search engine optimization issues. In recent weeks, Cutts has expressed his opinion at various conferences and public settings t...

fishing - small

How to Avoid Being Phished

Phishing is associated with fraudulent activities and stealing personal information on web. The sensitive information including passwords, ID and details of credit cards are acquired by the process of phishing. This kind of ID theft takes place through electronic communicati...

Page 1 of 3123