Reading Time: 3 minutes ‘Tis the season for holiday shopping. Economic forecasters anticipate holiday retail sales will reach a new all-time high in 2019, with U.S. spending set to top $725 bi...
https://blog.comodo.com/e-commerce/avoid-becoming-a-victim-on-black-friday-and-cyber-monday/
Reading Time: 3 minutes In light of recent research which contends that the SHA-1 hashing algorithm could be more vulnerable to attack than was previously thought, both Microsoft and Mozilla have...
Reading Time: 2 minutes OpenSSL has recently disclosed a high severity vulnerability that may require you to upgrade your version of OpenSSL. Comodo anticipates this flaw will only affect a small...
https://blog.comodo.com/e-commerce/openssl-security-advisory/
Reading Time: 2 minutes For the first time in almost 20 years, Internet trust has a new leader! This month, Comodo surged past perennial chart topper Symantec/Verisign in market share for issuing...
https://blog.comodo.com/e-commerce/comodo-surges-lead-internet-trust/
Reading Time: 2 minutes SSL is widely used today to secure communication on web pages that send sensitive information to a web server, such as login credentials or financial data. Indeed, it is e...
Reading Time: 3 minutes Tis the season to be jolly, and to do a lot of holiday shopping! It’s an important time for both the shoppers and the retailers, and is also a very risky time due to the...
https://blog.comodo.com/e-commerce/tips-secure-shopping-black-friday-cyber-monday-deals-2014/
Reading Time: 2 minutes You can’t do e-Commerce or exchange personal information without an encrypted connection. You could try, but you won’t be able to accept credit cards and would be a si...
https://blog.comodo.com/e-commerce/ssl-certificate-browser-compatibility-matters/
Reading Time: 2 minutes Web sites have never been more under attack by hackers and E-commerce sites are a prime target. Right now, do you know if your web site is infected with malware? PCI V...
https://blog.comodo.com/e-commerce/need-pci-vulnerability-scanning/
Reading Time: 2 minutes Many e-Commerce sites display “Trust Seals”, aka Trust Mark Logos, provided by third parties who have conducted an independent audit of the site or its ownership. The ...
https://blog.comodo.com/e-commerce/trust-seals-e-commerce-depends-on-tryust/
Reading Time: 3 minutes When you work with SSL (Secured Sockets Layer) to secure your web site or other types of communication, you may notice reference to another communications protocol TLS, Tr...
https://blog.comodo.com/e-commerce/tls-vs-ssl-whats-difference/
Reading Time: 2 minutes Last Friday, President Obama signed an executive order requiring credit and debit cards issued to and on behalf of the Federal Government to conform to the EMV standards c...
https://blog.comodo.com/e-commerce/obama-acts-promote-chip-pin-card-security/
Reading Time: 3 minutes Extended Validation SSL Certificates are the most recent innovation in SSL Certificates. EV SSL certificates combat online threats that erode trust online. They provide a ...
https://blog.comodo.com/e-commerce/understanding-ev-ssl-certificate/
Reading Time: 3 minutes The Certificate and Browser industry standards are continuously being reviewed and adjusted to meet the demands of an ever changing threat environment. Providers have a lo...
https://blog.comodo.com/e-commerce/phase-ssl-certs-internal-names-reserved-ip/
Reading Time: 2 minutes Who are znappz? Znappz is a software developer in the UK and Norway that specializes in games and apps for mobile devices. For example , they are currently featuring an iP...
https://blog.comodo.com/e-commerce/customer-success-story-znappz-wins-free-ssl/
Reading Time: 2 minutes A Wildcard SSL Certificate allows you to secure your main domain AND all first level sub-domains of that domain. Wildcard certificates can easily be identified by the aste...
Reading Time: 2 minutes Great news from Google this week for SSL users! The leading search engine is adjusting its famous and mysterious ranking algorithm to reward sites that use SSL. This means...
https://blog.comodo.com/e-commerce/google-favor-sites-ssl-ranking/
Reading Time: 6 minutes If you have an e-Commerce site you are in crosshairs of hackers. Why? Because you are the goose with the golden eggs they covet most. You handle customer credit card and p...
https://blog.comodo.com/e-commerce/e-commerce-in-the-crosshairs/
Reading Time: 2 minutes Data breaches that impact customers are costly in many ways. They are costly to cleanup. They are costly in the erosion of their customer’s confidence and business. They...
https://blog.comodo.com/e-commerce/e-bay-data-breach-class-action-suit-alleges-negligence/
Reading Time: 2 minutes Every time you turn around, it seems there is another high profile data breach in the news that involves the compromise of cardholder data. The Target data breach alone ma...
https://blog.comodo.com/e-commerce/penetration-vs-vulnerabilty-testing-know-difference/
Reading Time: 4 minutes Without SSL and SSL Certificates e-Commerce as we know it would not be possible. All SSL Certificates provide a secure connection between a browser and a server with all m...
Reading Time: 3 minutes There is a right way and a wrong way for an organization to handle a data breach. Unfortunately, they are sometimes the SAME way. The consensus in crisis management is tha...
https://blog.comodo.com/e-commerce/how-to-handle-a-data-breach/
Reading Time: 1 minute vBulletin Solutions announced this week that they have a critical emergency patch to their vBulletin forum software to fix an SQL injection vulnerability that could allow h...
https://blog.comodo.com/e-commerce/vbulletin-announces-emergency-patch-sql-injection-vulnerabiltu/
Reading Time: 3 minutes Various news reports have confirmed that many web servers are still vulnerable to the Heartbleed bug, which effects Apache servers running SSL. The bug was first reported ...
https://blog.comodo.com/e-commerce/many-servers-vulnerable-heartbleed-act-now/
Reading Time: 1 minute WordPress announced recently that they would join the club of web applications that use SSL by default for all of the web site’s they host, providing users with secured, ...
https://blog.comodo.com/e-commerce/wordpress-joins-club-secures-domains-ssl/
Reading Time: 5 minutes In the last few weeks, I have read a fair amount of press coverage about a new Bitcoin wallet application called Dark Wallet. I have also received many inquiries from vari...
Reading Time: 3 minutes Overview The Payment Card Industry Data Security Standard (PCI DSS) was jointly developed by American Express, Discover Financial Services, JCB International, MasterCard W...
Reading Time: 3 minutes Boiling Springs Savings Bank: Financial Institution introduces SVT technology that authenticates web content to protect critical customer information in online banking tra...
Reading Time: 2 minutes The growing use of the Internet for commerce, communication and collaboration has significantly increased the need for online security. Certification Authorities, who prov...
https://blog.comodo.com/e-commerce/trusted-root-keys-matter/
Reading Time: 3 minutes The Secure Sockets Layer (SSL) Protocol was adopted by Netscape in 1994 as a response to the growing concern over Internet security. Netscape’s goal was to create an enc...
Reading Time: 1 minute Mozilla is making its Firefox browser SSL verification stronger, and asking for help in making sure it works. Mozilla will pay $10,000 for critical vulnerabilities found in...
Reading Time: 2 minutes Over the past 6 months US retailers and American consumers have been rocked by a string of high profile Point of Sale System card data breaches, starting with the massive ...
https://blog.comodo.com/e-commerce/michaels-data-breach-effects-3-million-cardholders/
Reading Time: 2 minutes Should Google favor sites with SSL in their search results? Matt Cutts thinks so. He is the very public head of Google’s Webspam team and works on search engine optimiza...
https://blog.comodo.com/e-commerce/google-search-may-favor-ssl/
Reading Time: 4 minutes Business Challenge Many customers who are interested in buying a product off a new website feel unsure about the website’s authenticity. They worry that their informa...
https://blog.comodo.com/e-commerce/case-study-zamborg-com-needs-help-assuring-e-commerce/
Reading Time: 2 minutes When obtaining an SSL Certificate, the Certificate Authority (CA) performs a verification of the requesting organizations identity that will vary depending on the level of...
https://blog.comodo.com/e-commerce/ssl-validations-methods-not-all-cas-are-the-same/
Reading Time: 3 minutes In response to a reported vulnerability in the popular OpenSSL cryptographic library, Comodo is urging its customer, partners and all users of OpenSSL to apply the most re...
https://blog.comodo.com/e-commerce/heartbleed-bug-comodo-urges-openssl-users-to-apply-patch/
Reading Time: 4 minutes Comodo Antivirus Labs has identified a new and extremely dangerous variant of the Zeus banking Trojan. Hackers use Zeus to launch attacks that obtain the login credentials...
https://blog.comodo.com/e-commerce/comodo-av-labs-id-zeus-trojan/
Reading Time: 2 minutes As well as issuing SSL Certificate, a Trusted Root CA certificate can also be used to create another certificate, which in turn will then be used to issue SSL Certificates...
https://blog.comodo.com/e-commerce/what-are-chained-intermediate-certificates/
Reading Time: 1 minute Recently, we reviewed a document of best practices in deploying SSL Certificates published by Qualys, a prominent security company. Their document had some very good advi...
https://blog.comodo.com/e-commerce/when-it-comes-to-reliability-comodo-passes-the-test/
Reading Time: 2 minutes Retailers who accept credit cards must periodically demonstrate that they are in compliance the Payment Card Industry Data Security Standards (PCI DSS). Large retailers ar...
https://blog.comodo.com/e-commerce/target-data-breach-pci-dss-auditor-in-lawyers-crosshairs/
Reading Time: 1 minute SSL Certificates will only be recognized by a browser if the Root Certificate of the CA is present within the “trusted Root Certificates” store of the browser. CA Root ...
https://blog.comodo.com/e-commerce/why-is-ssl-certificate-browser-compatibility-so-important/
Reading Time: 2 minutes Authentication solutions prevent fraudulent account access risks. They also enable compliance with many security, banking and privacy regulations. What is Authentication? ...
https://blog.comodo.com/e-commerce/authentication-solutions-beyond-the-password/
Reading Time: 2 minutes The losses due the Target data breach are just beginning to be tabulated. According to financial results for the 4th Quarter, Target’s total loss for the period directly...
https://blog.comodo.com/e-commerce/target-data-breach-the-losses-mount-on-many-fronts/
Reading Time: 2 minutes Content Verification Certificates (CVC) facilitate the verification of “web page content”, the essential requirement for trusted e-commerce services that are now being...
https://blog.comodo.com/e-commerce/content-verification-certificates-and-why-you-need-them/
Reading Time: 3 minutes When you were a kid, presuming that you have indeed grown up, did you ever play the game “Man in the Middle”? That is where two players play a game of catch with a lar...
https://blog.comodo.com/e-commerce/stay-away-from-the-man-in-the-middle/
Reading Time: 2 minutes Owners of Bitcoins and fans of the virtual currency are reeling today on the news of the collapse of the largest Bitcoin exchange and a sharp decline in the value of Bitco...
https://blog.comodo.com/e-commerce/has-the-bitcoin-bubble-burst/
Reading Time: 1 minute Looking to save money on SSL and use Microsoft Exchange? Unified Communications SSL Certificates or Exchange SSL were created specifically for the Microsoft Exchange and/or...
https://blog.comodo.com/e-commerce/can-you-benefit-from-uc-certificates/
Reading Time: 1 minute Could a breach at a HVAC company specializing in supermarket refrigeration have led to the Target Data breach? Apparently so, according to mega retailer Target and Pennsylv...
https://blog.comodo.com/e-commerce/hvac-connection-to-target-data-breach-chilling/
Reading Time: 2 minutes Trust is the currency of the internet. Without it, communication, commerce or collaboration cannot take place. How do we know? Because 21% of internet visitors won’t sho...
Reading Time: 3 minutes Jean had a problem, she was managing over 200 endpoints and had no visual way to distinguish what devices were compliant, or even worse, had malware. To complicate matters...
https://blog.comodo.com/e-commerce/case-study-combating-zero-day-threats/
Reading Time: 2 minutes The recent data breach at the luxury specialty retailer Neiman Marcus has been overshadowed the mega data breach agt the retailing giant Target. However, it is nothing to ...
Reading Time: 2 minutes There are two things I‘ve learned for sure from studying internet security issues: Anyone can be hacked and hackers always have something new up their devious sleeves. T...
https://blog.comodo.com/e-commerce/google-hacked-local-hotel-listings-hijacked/
Reading Time: 2 minutes The Target data breach is a story that is not going to go away anytime soon. When Target first reported the breach of its Point of Sale System and credit card data last mo...
https://blog.comodo.com/e-commerce/target-data-breach-much-worse-than-we-first-knew/
Reading Time: 2 minutes If your web sites need SSL for subdomains a Wildcard SSL Certificate could be a great option. You can be purchase one that will cover a domain and all its subdomains. For ...
https://blog.comodo.com/e-commerce/wildcard-ssl-should-you-be-wild-about-them/
Reading Time: 2 minutes Millions of unsuspecting users were injected with malicious malware content because a number Yahoo’s advertising servers were compromised with malvertising. The malware ...
https://blog.comodo.com/e-commerce/yahoo-ad-servers-dish-malvertising/
Reading Time: 2 minutes It’s time for a change. The current credit card system has proven exceptionally vulnerable to breaches due, in part, to outdated technology. Retailers that suffer breach...
https://blog.comodo.com/e-commerce/outdated-credit-card-system-threatens-us-retailers/
Reading Time: 1 minute If your organization uses an MS® Exchange 2010 or Office Communications Server environment, you can consolidate all of your certificates into a single UC Certificate. Usin...
https://blog.comodo.com/e-commerce/why-choose-uc-certificates/
Reading Time: 2 minutes This has to be a difficult time for the IT security pros at the nation’s banks. They have been the targets of cyber attacks by the Iranians and “hactivists” intent o...
https://blog.comodo.com/e-commerce/banking-malware-because-thats-where-the-money-is/
Reading Time: 3 minutes Retailers, like Target, that accept bank cards are required to adhere to a strict set of standards for protecting the cardholder data, the Payment Card Industry Data Sec...
https://blog.comodo.com/e-commerce/target-data-breach-pci-scanning/
Reading Time: 2 minutes If you used a credit or debit card at a Target department store between November 27th and December 15th, your card data may have been stolen by hackers who accessed the st...
Reading Time: 3 minutes Code signing certificates from a trusted certificate provider allow developers to digitally sign their software so that customers know the code has not been altered or hac...
https://blog.comodo.com/e-commerce/code-signing-certificates/
Reading Time: 3 minutes Opinions on Bitcoin, the electronic payment method vary widely. To some, it represents no less than the dawning of a new age of individual empowerment and the beginning of...
https://blog.comodo.com/e-commerce/bitcoins-hackers-target-virtual-currency/
Reading Time: 2 minutes It’s often said “What’s old is new again”. The well-known ZeuS banking trojan is back again, but this time it is being spread as a 64 bit version. In fact, the 64b...
https://blog.comodo.com/e-commerce/zeus-banking-trojan-is-back-in-64-bit-now/
Reading Time: 2 minutes With the continued evolution of modern day super-computers and processing power, there exists the chance, albeit remote, that hackers could acquire the raw processing powe...
https://blog.comodo.com/e-commerce/upgrade-2048-bits-ssl-by-dec31st-free/
Reading Time: 3 minutes The Secure Sockets Layer (SSL) allows you to communicate over the Internet with a secure and encrypted connection. SSL is probably most associated with web sites and email...
https://blog.comodo.com/e-commerce/ssl-101-how-do-i-get-a-secured-connection/
Reading Time: 2 minutes I was recently reviewing Verizon’s recently annual Data Breach Investigations Report for 2013, published earlier this year. It is must reading for anyone who has an inte...
https://blog.comodo.com/e-commerce/what-does-a-data-breach-cost-your-reputation/
Reading Time: 2 minutes Comodo announced last week that our Web Inspector service now also uses the advanced malware detection technologies of their award winning Comodo Internet Security to iden...
https://blog.comodo.com/e-commerce/web-inspector-what-e-commerce-should-get-for-christmas/
Reading Time: 2 minutes There is an epidemic of identity theft that is costing businesses and consumers millions of dollars per year. Most of these incidents are the result of data breaches that ...
https://blog.comodo.com/e-commerce/pci-data-security-standards-beyond-compliance/
Reading Time: 2 minutes 1024 bit SSL certificates are about to be obsolete.After January 1, 2014 the 1024 bit SSL Certificate will join floppy disks and gopher servers in the grave yard of forgot...
https://blog.comodo.com/e-commerce/time-to-upgrade-say-goodbye-to-1024-bit-ssl/
Reading Time: 3 minutes By Benson HedgeWhen we talk of internet transactions, we have always been protecting them with passwords. But do you think passwords are a sure way of providing protection...
Reading Time: 3 minutes Between Flash and PDF Reader alone, Adobe is ubiquitous on today’s desktop. Have you ever registered for an Adobe product? If you have, you should seriously consider cha...
https://blog.comodo.com/e-commerce/how-safe-is-encrypted-credit-card-data/
Reading Time: 2 minutes I saw a recent headline “Dexter Strikes South Africa”. And I thought he was hiding out in Alaska! I was a big fan of the TV series Dexter, the show about an amiable vi...
https://blog.comodo.com/e-commerce/dexter-is-a-killer-virus-places-point-of-sale-systems-at-risk/
Reading Time: 1 minute No web site that exchanges personal data with its site visitors can afford to operate without SSL. Without it, internet communication is unsecure and hackers can easily lis...
https://blog.comodo.com/e-commerce/the-concept-of-securing-multiple-domains-with-ssl/
Reading Time: 4 minutes The notorious John Dillinger was supposedly asked why he robbed banks. His reply was “That’s where the money is!” You could get the same reply if you asked a hacke...
https://blog.comodo.com/e-commerce/the-heartland-breach-a-cautionary-tale-for-e-commerce/
Reading Time: 2 minutes Wow! On September 30th, Comodo’s (OCSP) responders handled over 2 billion requests in one day! Web users all over the globe can sleep better at night knowing Comodo has ...
Reading Time: 2 minutes Online retailer, Hayneedle.com, has become an astonishing success with security-conscious shoppers since the brand was introduced in August, 2009. According to Hayneedle�...
https://blog.comodo.com/e-commerce/case-study-hayneedle-enjoys-meteoric-growth-with-comodo-ev-ssl/
Reading Time: 2 minutes Update: check the latest version of Comodo’s free mobile security app The use of BitCoin, digital currency that is not backed by a government, is on the rise because...
Reading Time: 3 minutes There is an epidemic of identity theft and financial fraud hat is costing businesses and consumers millions of dollars per year. Most of these incidents are the result of ...
https://blog.comodo.com/e-commerce/pci-compliance-failure-is-not-an-option/
Reading Time: 4 minutes Electronic money (e-money) is being used more and more often by people to make online purchases. And sure as night follows day, this means electronic money is also gaining...
https://blog.comodo.com/e-commerce/malware-using-your-computer-to-make-digital-money/
Reading Time: 2 minutes November 6th is upon us, which in the United States means it is Election Day. And it isn't just any Election Day but for the position of President of the United States. Fo...
https://blog.comodo.com/e-commerce/obama-and-romney-finally-agreed-on-something/
Reading Time: 3 minutes Today GlobalSign, DigiCert, Comodo, and NGINX announced a joint effort and a sponsored development contract, to enhance the NGINX open source Web server to support OCSP-st...
Reading Time: 3 minutes Griffin, the Victorian-era character H. G. Wells gifted with invisibility, proclaimed himself to be the inventor of the greatest scientific advance of all time. But today,...
Reading Time: 2 minutes Another day, another innovative product from the security experts from Comodo. This time, it is free tool for protecting web sites from malware and blacklists. Comodo, tod...
Reading Time: 2 minutes You sweat bullets. You research, conduct focus groups, design and test market products tailored explicitly to answer the needs of your customers. You name them enticingly,...
Reading Time: 2 minutes The No. 1 reason why an e-commerce Web site customer doesn’t complete a buying transaction is WORRY. That uncomfortable apprehension that grows out of a customer’s pri...
Reading Time: 1 minute Seems like it’s never been harder than it is today to turn Internet shoppers into buyers. While Web use may grow every year, many e-commerce retailers are finding that th...
https://blog.comodo.com/other/the-science-of-improving-ecommerce-sales-in-uncertain-times/
Reading Time: 2 minutes To reach any Web site, every customer on earth sends his Go To request to a regional Domain Name System Server. Better known as a DNS Server. This is a basic component of ...
Reading Time: 3 minutes Having identified what happened, the next step we must take is to re-evaluate our threat model. Internet security is much harder than other areas because the Internet is c...
Reading Time: 3 minutes On March 15th 2011, a Comodo affiliate RA was compromised resulting in the fraudulent issue of 9 SSL certificates to sites in 7 domains. Although the compromise was detect...
Reading Time: 3 minutes Comodo and Trust Assurance Management solutions today has announced a new case study recently published on Merchant-Accounts.ca, an innovative Canadian merchant account se...