Open source software is great, especially the part about being able to use it without paying a license. The underlying source code is also made available for community development. Unfortunately, hackers can take advantage of it to make fake copies of popular software. This...
Jean had a problem, she was managing over 200 endpoints and had no visual way to distinguish what devices were compliant, or even worse, had malware. To complicate matters, her current endpoint manager used antiquated black listing technology that left her vulnerable to zero...
While other security companies and their users are still struggling to deal with the infamous ransomware Cryptolocker, we have no worries at Comodo. In fact, if you use our Comodo Endpoint Security, with our unique Auto-Sandbox technology, you are already safe and secure fr...
The recent data breach at the luxury specialty retailer Neiman Marcus has been overshadowed the mega data breach agt the retailing giant Target. However, it is nothing to sneeze at. With 1.1 million debit and credit cards compromised the consequences many be huge. While this...
We really thought we were protected by our existing AV and managed email service. This virus was a drain on our resources. The experts from Comodo and our MSP got us fixed and provided a real approach for security. We will no longer take for granted that all solutions are cr...
In the late 80′s and 90′s, most of the projects I was involved with were about converting paper based systems to computer entry, mostly PCs. In those days, it was very easy for a project to show results. Even a poorly designed system could easily show dramatic pr...
April 8th, 2014 is D-Day for Windows XP users everywhere. That’s when Microsoft is going to end support for its venerable operating system, first launched way back in 2001. Users of XP have been remarkably slow to upgrade to newer versions of Windows, creating an odd situati...
Mobile device security, long neglected by device makers, Internet software makers and end users, is increasingly becoming a high priority. Mobile is the direction of computing these days, and hackers are approaching the popular mobile platforms as targets of opportunity. Com...
There are two things I‘ve learned for sure from studying internet security issues: Anyone can be hacked and hackers always have something new up their devious sleeves. The news that Google+ has been breached is a case in point. Yesterday, the blog site searchengine.com repor...
The Target data breach is a story that is not going to go away anytime soon. When Target first reported the breach of its Point of Sale System and credit card data last month, it was the largest reported data breach of the year and one of the most significant in history. Acc...