Millions of Americans are working hard these days to finalize their tax returns before the annual April 15th deadline. With the IRS on our minds, hackers are launching phishing email campaign pretending to be from our favorite agency in the US Treasury department. If you get...
If you are confused about what Antivirus protection is provided by Windows, don’t feel bad. Microsoft has changed its strategy and product name several times over the years. For Windows 7 they bundled an Antivirus system with a package of applications called Windows Essenti...
Microsoft is working furiously to convince users of Windows XP to abandon the venerable operating system before they end support on April 8th, warning of dire consequences when they halt the release of security patches. Most of this attention has been on individual XP users...
Recently, we reviewed a document of best practices in deploying SSL Certificates published by Qualys, a prominent security company. Their document had some very good advice. In particular, we agree whole heartedly with their recommendation that an SSL user should “obtain ce...
Retailers who accept credit cards must periodically demonstrate that they are in compliance the Payment Card Industry Data Security Standards (PCI DSS). Large retailers are required to undergo periodic audits by independent auditors, called qualified security assessors (QSAs...
Comodo announced today the initial release of its free Comodo ModSecurity Rules for the LiteSpeed Web Server. ModSecurity rules are used by the popular ModSecurity Apache ™web server plug-in to provide advanced network filtering, security and intrusion protection. Melih Abdu...
Now more than ever before, computer users need to take measures to protect themselves online, and choosing the right antivirus software is a key step in defending against cyberthreats. New malware is created everyday, and hackers have grown more sophisticated – logging hours...
One of the most annoying and often dangerous computer compromises is browser hijacking. You probably have experienced it. A program changes your home page, redirects browser typos to a search engine you have never heard of or to other sites. This is annoying, popping up ads...
Firefox 28, released on Tuesday, provided numerous important security fixes including 5 for flaws identified in the recent Pwn2Own competition. Pwn2Own is a hacking competition where each successful exploit earned the researcher(s) $50,000. FireFox was hacked successfully th...
SSL Certificates will only be recognized by a browser if the Root Certificate of the CA is present within the “trusted Root Certificates” store of the browser. CA Root Certificates are added into the trusted Root Certificate store by the browser or operating syst...