Reading Time: 3 minutes Early warning systems save lives. People in tsunami risk zones rely on seismic activity sensors and sea level gauges for advance alerts that give them time to get to safet...
Reading Time: 3 minutes If the last five years have taught us anything, it’s that cybersecurity should always be a primary concern for every business. In 2017, ransomware damages cost businesse...
https://blog.comodo.com/comodo-news/how-secure-is-your-network/
Reading Time: 3 minutes ‘Tis the season for holiday shopping. Economic forecasters anticipate holiday retail sales will reach a new all-time high in 2019, with U.S. spending set to top $725 bi...
https://blog.comodo.com/e-commerce/avoid-becoming-a-victim-on-black-friday-and-cyber-monday/
Reading Time: 3 minutes National Cybersecurity Awareness Month is now well underway, and this year’s theme is “Own IT. Secure IT. Protect IT.” The core message is simple: today’s business...
https://blog.comodo.com/comodo-news/forensic-analysis-tools/
Reading Time: 3 minutes Celebrate National Cybersecurity Awareness Month By Learning to Protect Against Ransomware Attacks It’s the season for pumpkin picking, leaves changing color, getting re...
https://blog.comodo.com/comodo-news/protect-business-from-ransomware-attacks/
Reading Time: 3 minutes Did you know October is National Cyber Security Awareness Month (NCSAM) in the U.S.? Started by the National Cyber Security Division within the Department of Homeland Secu...
https://blog.comodo.com/it-security/comodo-cybersecurity-partner-programs/
Reading Time: 3 minutes The 5 Most Common Pitfalls in Your Security Stack That Put You at Risk for a Breach It can take 6 months or more for an organization to realize a data breach has occurred....
https://blog.comodo.com/it-security/5-most-common-pitfalls-in-security-stack/
Reading Time: 5 minutes Today’s businesses are spending more than ever before on cybersecurity solutions. But, all this spending is doing little to curtail the damage cybercrime is causing or t...
https://blog.comodo.com/it-security/legacy-cybersecurity-solutions-are-broken/
Reading Time: 3 minutes When it comes to data breaches, 2019 already looks ominous. More than one billion records were exposed in the first quarter of the year alone, with a greater number of ind...
https://blog.comodo.com/it-security/5-biggest-data-breaches-in-2019/
Reading Time: 3 minutes Two months have passed since the city of Baltimore was hit by the latest in a string of ransomware attacks targeting municipalities, and things still aren’t completely b...
https://blog.comodo.com/it-security/hacked-what-went-wrong-in-the-city-of-baltimore-md/
Reading Time: 3 minutes Usually summer means vacation and relaxation. But as we’ve seen in recent history, summer plans can be brutally disrupted when cyber threats strike. Just two years ago, ...
https://blog.comodo.com/malware/dont-forget-your-security-protection-framework-in-this-summer/
Reading Time: 3 minutes For millions of Americans, the Fourth of July means fireworks, picnics and barbecues, and the chance to take a much-needed vacation. According to AAA, 2019 is going to be ...
https://blog.comodo.com/it-security/pc-security-security-does-not-get-vacation/
Reading Time: 3 minutes Source: Comodo One of the most well-known ransomware attacks occurred in May 2017, when the Wannacry attack unfolded. That attack affected over 200,000 users and infect...
https://blog.comodo.com/it-security/pc-security-protect-your-organization-from-ransomware-attacks/
Reading Time: 3 minutes Digital transformation is creating a wealth of new opportunities for today’s businesses, but it’s also increasing the risks to the security of their data and informati...
Reading Time: 3 minutes Not all fads and technology last the test of time. In the 1990s, Olestra, a no-calorie artificial fat appeared in snack foods. It promised consumers the ability to eat del...
https://blog.comodo.com/it-security/changes-in-cyber-security/
Reading Time: 3 minutes In today’s business environment, the term “endpoint” has become synonymous with any device that can connect to a network – desktops, laptops, tablets, smartphones ...
https://blog.comodo.com/it-security/endpoints-putting-business-at-risk/
Reading Time: 3 minutes What Is Phishing? Phishing is a method employed by cybercriminals to access email accounts and systems using deception rather than defeating security protections. In basic...
Reading Time: 4 minutes Many people don’t take Potentially Unwanted Applications (PUA) as a serious danger. The reason for such a reckless attitude is that PUA are usually installed with the co...
https://blog.comodo.com/comodo-news/how-unwanted-applications-are-greater-security-threat/
Reading Time: 4 minutes The Gartner Information Security & Risk Management Summit at National Harbor, Maryland ran from June 3rd to 7th. Gartner’s event is a great opportunity for cybersecurity...
https://blog.comodo.com/it-security/gartner-event-and-risk-management-summit-in-maryland/
Reading Time: 5 minutes Good ITSM tools support a whole set of ITSM processes. They are offered as a suite of services for execution of ITSM processes in an organization. The core process is a wo...
Reading Time: 3 minutes Unless you’ve been living under a rock for the past few days, you’ll have heard that there are a couple of new computer security vulnerabilities that are causing panic...
https://blog.comodo.com/it-security/meltdown-spectre-serious-vulnerabilities-affects-device/
Reading Time: 2 minutes IT professionals understand the necessity of patches, even if it’s not one of their favorite things to do. However, if someone told you that there was an option that did...
https://blog.comodo.com/pc-security/3-important-things-windows-patch-management/
Reading Time: 3 minutes Comodo IT and Security Manager (ITSM), which is a part of Comodo One initiative and is available absolutely free, assists MSPs in managing their client infrastructure, by ...
https://blog.comodo.com/it-security/getting-started-comodo-security-manager-itsm/
Reading Time: 2 minutes Every cybersecurity responsible person knows the power of paranoia. Assume nothing, test everything, and then do it again. Here are three basic questions to ask: 1. How cl...
https://blog.comodo.com/it-security/increase-cyber-security-asking-three-easy-questions/
Reading Time: 3 minutes For those of us who have a credit report, there’s a good chance that our sensitive personal information was exposed in a data breach at Equifax. They have since publishe...
https://blog.comodo.com/it-security/3-lessons-can-learn-equifax-hack/
Reading Time: 2 minutes Industry Analysts and “Experts” are sometimes wrong. Sometimes very wrong. Like with a weather man I heavily discount their predictions, especially the ones wi...
https://blog.comodo.com/it-security/analyst-view-facts-and-science-for-it-security/
Reading Time: 3 minutes Digital transformation is speeding up especially in the retail section. Store environment is feeling the heat that they need to catch up with the implementation and stay a...
https://blog.comodo.com/web-security/think-retailers-compromising-security/
Reading Time: 9 minutes Here’s an A to Z glossary of terms related to Endpoint Protection- A Advanced Persistent Threat (APT) – An unauthorized person gaining access to a network, staying the...
https://blog.comodo.com/it-security/endpoint-security-glossary/
Reading Time: 6 minutes Contents: 1. Introduction 2. Preparing the environment 3. Attack analysis and prevention 4. Conclusion 1) Introduction Web applications are arguably the most important ele...
Reading Time: 2 minutes Endpoint security is of prime importance today; we see lots of endpoint devices getting connected to enterprise networks, thereby increasing the chances of hacks and data ...
https://blog.comodo.com/it-security/choose-endpoint-protection-software-business/
Reading Time: 2 minutes The importance of live patching of Linux kernel came to light with the recent Dirty COW vulnerability. The Dirty COW privilege escalation vulnerability shook the Linux wor...
https://blog.comodo.com/it-security/importance-linux-kernel-live-patching/
Reading Time: 2 minutes GlobalSign SSL certificates seemed to be causing issues to many users recently. Users around the globe who were accessing HTTPS websites secured with GlobalSign SSL certif...
https://blog.comodo.com/it-security/globalsign-ssl-certificate-revocation-error-causes-issues-users/
Reading Time: 3 minutes Artificial Intelligence (A.I) is touching lives in the most intimate of manners and seems to be playing a vital role in creating a new and better world for us human beings...
https://blog.comodo.com/it-security/how-enterprise-it-would-gain-from-artificial-intelligence/
Reading Time: 3 minutes Today, Comodo announced availability of its next version of its free Comodo IT management platform, Comodo One MSP version 3.1. Comodo One MSP (formerly known as Comodo ON...
https://blog.comodo.com/it-security/comodo-updates-free-msp-managed-services-solution/
Reading Time: 3 minutes In the U.S., April 18 is Tax Filing Day – But it is also an Unofficial National Phishing Day for the Cybercriminal The April 18 deadline for submitting individual and co...
https://blog.comodo.com/it-security/unofficial-national-phishing-day-for-the-cyber-criminal/
Reading Time: 3 minutes It might come as a surprise to learn that Utah – with its beautiful terrain and picturesque views – could be a hive of activity for the origination of spam emails. But...
https://blog.comodo.com/it-security/the-state-that-sends-the-most-email-spam/
Reading Time: 2 minutes This week, the best and brightest from the growing security industry landscape will gather in San Francisco for the annual RSA Conference. Maybe now more than ever in the ...
Reading Time: 4 minutes The Comodo Threat Research Labs (CTRL) team has identified a phishing attack that was targeted specifically at ICICI Bank and its customers, India’s largest private bank...
https://blog.comodo.com/it-security/new-phishing-attack-targets-icici-bank/
Reading Time: 2 minutes Financial services organization, banks, retail outlets and now hospitals and medical centers. No industry seems to be safe from the rising frequency of ransomware attack...
Reading Time: 2 minutes In a new byline in Security-Today, Comodo Director of Service Provider Technologies Michél Bechard writes about a layered approach to security and the infrastructure, and...
https://blog.comodo.com/it-security/how-a-layered-approach-to-it-security-can-help/
Reading Time: 1 minute In a new thought leadership article in Business Solutions Magazine, Comodo Product Manager Ilker Simsir outlines how the services industry has morphed from the reactive bre...
https://blog.comodo.com/it-security/what-do-msps-need-to-tell-while-choosing-right-it-security/
Reading Time: 1 minute The ability to mind customer systems from afar is vital for Managed Service Providers. Robust remote management and monitoring (RMM) software can allow you to fix problems ...
https://blog.comodo.com/it-security/what-are-three-critical-components-in-a-successful-rmm-system/
Reading Time: 3 minutes Are you thinking about leaving your “break-fix” business model behind? The latest cloud-based management tools such as offered for free on the Comodo One platform, off...
https://blog.comodo.com/it-security/4-strategies-for-making-the-break-from-breakfix-to-msp/
Reading Time: 2 minutes With more than a decade passing since IT service companies first started offering MSP services; it comes as a bit of a shock to find that many providers still derive most ...
https://blog.comodo.com/it-security/are-breakfix-services-breaking-your-msp-business/
Reading Time: 3 minutes The IT services industry continues to shift from the old, reactive break-fix model to the proactive Managed Services (MSP) approach, and for good reason: while small to me...
Reading Time: 1 minute BitDefender, the well-known IT security firm, fell victim to a data breach in which hackers stole critical customer data. A hacker is demanding $15,000, or, if payment isn�...
Reading Time: 2 minutes Remember when online security meant avoiding those sites on the wrong side of the tracks? No more. Malvertising is booming—not only in the number of attacks, but in soph...
https://blog.comodo.com/malware/beware-ad-attacks-malvertising-is-booming/
Reading Time: 2 minutes An SSL/TLS vulnerability has been identified that attackers could use to downgrade the cryptography of HTTPS connections to one vulnerable to decryption. allowing attacker...
https://blog.comodo.com/comodo-news/freak-attack-warning-apple-google-devices-vulnerable/
Reading Time: 2 minutes The National Security Agency (NSA)’s Information Assurance Directorate has released a report on “Defensive Best Practices for Destructive Malware”. The document desc...
https://blog.comodo.com/it-security/nsa-report-defensive-best-practices-destructive-malware/
Reading Time: 2 minutes Natural Grocers, a Colorado based health food chain that operates in 13 state. is investigating a breach impacting customer payment card data. The company believes the inc...
https://blog.comodo.com/it-security/natural-grocers-reports-cardholder-data-breach/
Reading Time: 3 minutes Spam email is to the Internet what pollution is to waterways and phishing email is the most toxic of digital pollutants. Current measures for dealing with unsolicited mail...
https://blog.comodo.com/comodo-news/comodo-korumail-comprehensive-solution-spam-onslaught/
Reading Time: 2 minutes It is a sign of the times that a cyber criminal makes the FBI’s top 10 most wanted list. And the Feds are serious about finding him. The United States Department of Stat...
https://blog.comodo.com/it-security/want-3-million-find-botnet-admin-evgeniy-bogachev/
Reading Time: 2 minutes The only thing cybercriminals like more than activities that expose social security numbers are ones that involve debit/credit card transactions. With millions of people f...
https://blog.comodo.com/it-security/tax-season-identity-theft-season/
Reading Time: 3 minutes What’s worse, having your network compromised by a hacker or having your network compromised by a hacker and not knowing about it? Advanced Persistent Threats and zero-d...
https://blog.comodo.com/it-security/cwatch-delivers-umatched-awareness-zero-day-threats-malware/
Reading Time: 2 minutes The latest high profile data breach is a big one. Health insurance provider Anthem is reporting that records of as many 80 million customers and employees have been compro...
https://blog.comodo.com/it-security/anthem-data-breach-80-million-compromised/
Reading Time: 1 minute The Linux GNU C Library (glibc) versions prior to 2.18 are vulnerable to remote code execution via a vulnerability in the gethostbyname function. The vulnerability, nicknam...
https://blog.comodo.com/it-security/whos-afraid-linux-ghost/
Reading Time: 2 minutes Oracle released its so call Critical Patch Update yesterday for numerous products and critical flaws that need to be addressed. Of note is a fix for a serious misconfigura...
https://blog.comodo.com/it-security/oracle-issues-masssive-critical-patch-update/
Reading Time: 2 minutes Twitter hacks have become increasingly common and several high profile hoaxes raise serious questions about Internet Security. On Friday the Twitter accounts of two promin...
https://blog.comodo.com/it-security/world-war-iii-begun-beware-twitter-hack-hoaxes/
Reading Time: 2 minutes The problem with conventional antivirus software is that they are like a bomb disposal unit that has not yet figured out where the bomb is. They have to find the bomb to d...
https://blog.comodo.com/it-security/sandbox-nice-auto-sandboxing-essential/
Reading Time: 4 minutes Once again, terror is in the news and dominates much of the national discussion. A major European city, the great City of Lights, was brought to a standstill last week dea...
https://blog.comodo.com/it-security/online-privacy-security-concerns-age-terror/
Reading Time: 1 minute OpenSSL has released updates patching eight vulnerabilities, one of which may allow an attacker to cause a Denial of Service condition. The OpenSSL security update addresse...
https://blog.comodo.com/it-security/openssl-security-update-patches-denial-service-vulnerability/
Reading Time: 1 minute Comodo now provides one stop network and endpoint protection with the Korugan Unified Threat Management appliances. Korugan UTM integrates state of the art network firewall...
https://blog.comodo.com/comodo-news/comodo-introduces-korugan-unified-threat-management/
Reading Time: 2 minutes The Pew Research Institute released a study recently that shows that over 91% of Americans believe that consumers have lost control of their privacy. This should not be a ...
https://blog.comodo.com/it-security/study-americans-believe-lost-control-privacy/
Reading Time: 2 minutes It’s the Grinch that threatens your Linux! A bug in Linux dubbed “the Grinch” has been revealed that could allow a hacker to obtain escalated privileges and gain adm...
https://blog.comodo.com/it-security/grinch-linux-bug-threatens-itville/
Reading Time: 2 minutes Who let the dog out, again? Earlier this year, it was revealed that hackers could force a downgrade of encrypted connections to the outdated and exploitable SSL 3.0 protoc...
https://blog.comodo.com/it-security/poodle-bites-new-poodle-attacks-impact-tls/
Reading Time: 2 minutes The Internet Systems Consortium (ISC) has released security updates to address multiple vulnerabilities in BIND, one of which may allow a remote attacker to cause a denial...
https://blog.comodo.com/it-security/using-bind-dns-critical-updates-required/
Reading Time: 2 minutes Comodo has recently acquired MyDLP, a complete Data Loss Prevention (DLP) solution that provides Enterprise grade protection for organizations big and small. MyDLP is a pr...
Reading Time: 3 minutes Healthcare is sure to be a hot topic in 2015 in the United States as the long delayed employer mandate kicks in. For most Americans, this will the first time they are dire...
https://blog.comodo.com/it-security/medical-records-save-digital-world/
Reading Time: 3 minutes Mysteries are the most popular genre in books, movies and films. Everyone loves to solve a mystery and we now have a doozy of one in real life! The data breach of Sony Pic...
https://blog.comodo.com/it-security/hollywood-whodunit-hacked-sony/
Reading Time: 1 minute Docker has released a critical security updates to address security flaws in Docker versions prior to version 1.3.2. These include fixes for two critical vulnerabilities, o...
https://blog.comodo.com/it-security/docker-requires-critical-security-updates/
Reading Time: 2 minutes These are troubled times for the US Postal Service, due to the threat that email and electronic communication has posed to its monopoly on first class mail. The last thing...
https://blog.comodo.com/it-security/post-office-data-breach-raises-many-questions/
Reading Time: 2 minutes Comodo announced today announced that our Cloud-based AntiSpam Gateway (ASG) service filtered its 100 millionth email last month with over one half million viruses blocked...
https://blog.comodo.com/comodo-news/milestone-comodo-antispam-gateway-filters-100th-million-emails/
Reading Time: 4 minutes Over the past year, there have been an alarming number of high profile data breaches of customer cardholder and personal information through compromises of retail Point-of...
Reading Time: 2 minutes The White House has had several breaches of its physical security recently that have caused embarrassment and concern for the Secret Service. It now appears there needs to...
https://blog.comodo.com/it-security/white-house-cyber-attack/
Reading Time: 3 minutes When you work with SSL (Secured Sockets Layer) to secure your web site or other types of communication, you may notice reference to another communications protocol TLS, Tr...
https://blog.comodo.com/e-commerce/tls-vs-ssl-whats-difference/
Reading Time: 3 minutes It is a commonly held myth that ATM machines are not vulnerable to the type of malware infections that plague other endpoint systems because they are more isolated from th...
https://blog.comodo.com/it-security/atms-vulnerable-malware-breaches/
Reading Time: 2 minutes On October 9th, Computing Security Magazine named Comodo Endpoint Security Manager (CESM) the “Anti Malware Solution Of the Year for 2014” at their annual awards dinne...
https://blog.comodo.com/comodo-news/computing-security-magazine-honors-comodo-endpoint-security/
Reading Time: 2 minutes The opportunities for hackers and cybercriminals never seems to end. Microsoft issued a warning this week on an unpatched zero day vulnerability that threatens users of Wi...
https://blog.comodo.com/it-security/microsoft-plagued-zero-day-vulnerabilities/
Reading Time: 2 minutes There are not a lot of details at this point, but it appears that yet another major US retailer has suffered a breach of its POS system. The online blog krebsonsecurity.co...
https://blog.comodo.com/it-security/staples-pos-data-breach-go/
Reading Time: 2 minutes Last Friday, President Obama signed an executive order requiring credit and debit cards issued to and on behalf of the Federal Government to conform to the EMV standards c...
https://blog.comodo.com/e-commerce/obama-acts-promote-chip-pin-card-security/
Reading Time: 1 minute Apple has released fixes for OS X Mountain Lion v10.8.5 and OS X Mavericks v10.9.5 to address vulnerabilities in SSL 3.0, referred to as the POODLE bug. An attacker can use...
https://blog.comodo.com/it-security/apple-fixes-tame-poodle-bug-macs/
Reading Time: 3 minutes This has been a rough year in Internet Security. There has been a deluge of data breaches, especially against Point-of-Sale systems. There was the Heartbleed bug that thre...
https://blog.comodo.com/comodo-news/advisory-poodle-threat-requires-immediate-attention/
Reading Time: 1 minute Drupal has released a security advisory to address an application program interface (API) vulnerability that could allow an attacker to execute arbitrary SQL commands on an...
https://blog.comodo.com/it-security/drupal-reveals-critical-bug/
Reading Time: 2 minutes Comodo announced this week the release of Comodo Endpoint Security Manager version 3.2 (CESM 3.2), its platform for endpoint protection and management. CESM provides...
https://blog.comodo.com/comodo-news/comodo-enhance-endpoint-protection-cesm-3-2/
Reading Time: 1 minute Oracle has released security updates to address BASH bug vulnerabilities found across multiple products. However, Oracle also included in its announcement a list of 42 Orac...
https://blog.comodo.com/malware/oracle-battles-bash-bug-much-work-left/
Reading Time: 2 minutes The news last week that 76 million household customers and 7 million business customers of JPMorgan may have had their personal information compromised was shocking enough...
https://blog.comodo.com/it-security/jpmorgan-chase-breach-part-russian-cyberwar/
Reading Time: 1 minute IT is on high alert to deal with a fault in the BASH command interpreter found on Unix OS variants that could allow a hacker to take control of the computer. Apple is one...
https://blog.comodo.com/malware/bash-update-apple-scramble-deal-bash-bug/
Reading Time: 3 minutes The Certificate and Browser industry standards are continuously being reviewed and adjusted to meet the demands of an ever changing threat environment. Providers have a lo...
https://blog.comodo.com/e-commerce/phase-ssl-certs-internal-names-reserved-ip/
Reading Time: 1 minute Linux and MAC OS X users need to be aware that a crtitical flaw in the "Bourne Agains Shell" (BASH) that processes commands may allow remote attackers to execute arbitrary ...
https://blog.comodo.com/it-security/linux-mac-users-shellshocked-bash-vulnerability/
Reading Time: 1 minute Home Depot confirmed this week that recent breach of its point-of-sale system is one of the worst data breaches on record, with over 56 million debit and credit cards compr...
https://blog.comodo.com/it-security/home-depot-data-breach-56-million-cards-compromised/
Reading Time: 1 minute WordPress 3.9.2 has been released to address multiple vulnerabilities, including a critical security bug that could allow a critical denial of service issue. WordPress is t...
https://blog.comodo.com/it-security/wordpress-critical-security-bug/
Reading Time: 2 minutes When will the wave of POS data breaches that have been rocking American retail recently end? Not today, as retail giant Home Depot announced that they appear to have joine...
https://blog.comodo.com/it-security/home-depot-data-breach-rocks-retail/
Reading Time: 2 minutes It may be time to stop writing articles about point-of-sale data breaches and write about companies that have not had a breach. It may soon be a shorter list. Dairy Queen ...
https://blog.comodo.com/it-security/dairy-queen-backoff-pos-malware-strikes/
Reading Time: 2 minutes In July, Homeland Security warned of the Backoff POS malware threat, which has the ability to steal cardholder data and customer personal information. Their Computer Emerg...
https://blog.comodo.com/it-security/homeland-security-warns-backup-pos-malware-speading-fast/
Reading Time: 1 minute Another day, another high profile data breach! UPS became the latest company this week to announce a breach of customer cardholder and personal information. Fortunately, th...
https://blog.comodo.com/it-security/ups-data-breach-brown-frown/
Reading Time: 1 minute According to a July 2014 regulatory filing, Community Health Systems (CHS), who operates over 200 hospitals in 28 states, disclosed that its computer network was compromise...
https://blog.comodo.com/it-security/chs-data-breach-4-5-million-risk-identity-theft/
Reading Time: 1 minute OpenSSL, the popular open source implementation of the SSL protocol, has released updates patching nine issues that including several critical security vulnerabilities. Thi...
https://blog.comodo.com/it-security/openssl-updates-fix-critical-security-vulnerabilities/
Reading Time: 2 minutes As if retail operations had enough to worry about with the wave of highly published data breaches, US Homeland Security is warning of a new malware threat that targets Poi...
https://blog.comodo.com/it-security/homeland-security-warns-pos-malware-backoff-threatens-retail/
Reading Time: 2 minutes Great news from Google this week for SSL users! The leading search engine is adjusting its famous and mysterious ranking algorithm to reward sites that use SSL. This means...
https://blog.comodo.com/e-commerce/google-favor-sites-ssl-ranking/
Reading Time: 2 minutes On August 4th, P.F. Chang released a statement from CEO Rick Federico with new information about the data breach identified in June that compromised credit and debit card ...
https://blog.comodo.com/it-security/p-f-chang-data-breach-new-details-emerge/
Reading Time: 3 minutes Comodo announced this week the latest addition to its portfolio of endpoint security products, Comodo SecureBox. SecureBox is a secure desktop application that enables use...
https://blog.comodo.com/comodo-news/endpoint-security-gets-boost-comodo-securebox/
Reading Time: 3 minutes A researcher at the Singapore security firm COSEINC, Joxean Koret, is all over the technical news sites. He is being quoted almost everywhere, including on ComputerWorld a...
Reading Time: 2 minutes Data breaches that impact customers are costly in many ways. They are costly to cleanup. They are costly in the erosion of their customer’s confidence and business. They...
https://blog.comodo.com/e-commerce/e-bay-data-breach-class-action-suit-alleges-negligence/
Reading Time: 3 minutes When I read about hackers and cyber criminals I often think of the old TV show Get Smart. After vanquishing a villain, Agent Maxwell Smart would often recite a lament that...
https://blog.comodo.com/it-security/hackers-dark-side-tech-revolution/
Reading Time: 2 minutes Every time you turn around, it seems there is another high profile data breach in the news that involves the compromise of cardholder data. The Target data breach alone ma...
https://blog.comodo.com/e-commerce/penetration-vs-vulnerabilty-testing-know-difference/
Reading Time: 1 minute The Mozilla has released security updates to address multiple vulnerabilities in their Firefox browser, including 11 critical fixes. Among the critical fixes is for a “us...
https://blog.comodo.com/it-security/mozilla-releases-critical-firefox-security-updates/
Reading Time: 1 minute vBulletin Solutions announced this week that they have a critical emergency patch to their vBulletin forum software to fix an SQL injection vulnerability that could allow h...
https://blog.comodo.com/e-commerce/vbulletin-announces-emergency-patch-sql-injection-vulnerabiltu/
Reading Time: 3 minutes Various news reports have confirmed that many web servers are still vulnerable to the Heartbleed bug, which effects Apache servers running SSL. The bug was first reported ...
https://blog.comodo.com/e-commerce/many-servers-vulnerable-heartbleed-act-now/
Reading Time: 3 minutes The latest release of the Comodo Antispam Gateway (CASG) went live today with new features for controlling and archiving email. CASG allows you to remove malware, phishing...
https://blog.comodo.com/comodo-news/comodo-asg-introduces-control-incoming-mail-mta-backup-feature/
Reading Time: 1 minute The following is the schedule of this week’s security webinars. You can sign up for these and webinars in the future at: http://www.comodo.com/resources/webinars/business...
https://blog.comodo.com/comodo-news/webinars-week-antispam-gateway-endpoint-security/
Reading Time: 1 minute Norse, an internet security firm, monitors internet traffic to identify cyber-attacks in progress. They have created have a very cool animated display that appears to be ba...
Reading Time: 2 minutes It’s been a rough few years for the Houston Astros baseball team on the field, in last place half way through this season and losing an astounding 111 games last year. I...
https://blog.comodo.com/it-security/major-league-data-breach-houston-astros-strike/
Reading Time: 2 minutes The Internet of Things (IoT) is a loose term for the concept that today’s computing and Internet technologies can be applied to almost any tool known to mankind, with re...
https://blog.comodo.com/it-security/internet-things-tech-dream-internet-security-nightmare/
Reading Time: 1 minute According to Homeland Securities Computer Emergency Response Team (US-CERT) SpamTitan contains a reflected cross-site scripting (XSS) vulnerability. SpamTitan is a server s...
https://blog.comodo.com/malware/alert-spamtitan-users-risk-cross-site-scripting-vulnerability/
Reading Time: 2 minutes Google began complying this week with a European Court Ruling that recognizes an individual’s “Right to be Forgotten” online. The right to be forgotten is a concept ...
Reading Time: 2 minutes There are two disturbing bits of news this week regarding the recently revealed cardholder data breach at PF Chang, the national chain of Chinese casual dining restaurants...
https://blog.comodo.com/it-security/pf-chang-data-breach-questions-answers/
Reading Time: 1 minute According to Homeland Security’s Computer Emergency Response Team (US-CERT), the Symantec Web Gateway contains SQL injection and cross-site scripting vulnerabilities. Sym...
https://blog.comodo.com/it-security/homeland-security-symantec-web-gateway-vulnerable/
Reading Time: 2 minutes Update: check the latest version of Comodo’s free mobile security app The company whose logo used to be the cracked Liberty Bell has some crack’s in its own data secur...
https://blog.comodo.com/mobile-security/att-notifies-wireless-customers-data-breach/
Reading Time: 1 minute Microsoft revealed this week that a vulnerability in its Malware Protection Engine could allow an attacker to cause a denial of service. This software is an integral part o...
https://blog.comodo.com/it-security/microsoft-antivirus-numerous-apps-impacted-vulnerability/
Reading Time: 1 minute WordPress announced recently that they would join the club of web applications that use SSL by default for all of the web site’s they host, providing users with secured, ...
https://blog.comodo.com/e-commerce/wordpress-joins-club-secures-domains-ssl/
Reading Time: 1 minute There is more bad news this week for the popular OpenSSL implementation of the SSL and TLS protocols, which was made vulnerable in April by the Heartbleed bug. This week we...
https://blog.comodo.com/it-security/openssl-vulnerability-exploited-man-middle-attacks/
Reading Time: 2 minutes Ransomware is quickly becoming the scourge of the Internet and Cisco Systems is reporting that several very popular web sites have recently been distribution points via ma...
https://blog.comodo.com/malware/cisco-popular-sites-spreading-ransomware-via-mavlertising/
Reading Time: 5 minutes In the last few weeks, I have read a fair amount of press coverage about a new Bitcoin wallet application called Dark Wallet. I have also received many inquiries from vari...
Reading Time: 3 minutes When we released Comodo Endpoint Security 3.0 in February 2013, we believed that its groundbreaking features would make it a popular solution for business and organization...
Reading Time: 3 minutes Flags that signal the risk of identity theft include suspicious activity indicating that identity thieves may be using stolen information. For example, names, Social Secur...
https://blog.comodo.com/it-security/red-flag-rules-identity-theft-compliant/
Reading Time: 2 minutes eBay Inc. issued a public statement today asking customers to change their web site passwords due to a breach of their customer database systems. Although they assert that...
https://blog.comodo.com/it-security/customer-data-breach-ebay-joins-growing-list-hacked-companies/
Reading Time: 2 minutes According to a new report by the Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), public facing control systems often have weak i...
Reading Time: 2 minutes The so called cyberwar between the US and China is about to take an interesting turn that could have significant consequences for one of the world’s most important strat...
https://blog.comodo.com/it-security/cyberwar-us-battle-chinese-military-court/
Reading Time: 2 minutes The growing use of the Internet for commerce, communication and collaboration has significantly increased the need for online security. Certification Authorities, who prov...
https://blog.comodo.com/e-commerce/trusted-root-keys-matter/
Reading Time: 3 minutes You may think that cyber-attacks are someone else’s problem. You would be wrong. Cyber-attacks are growing in their number, sophistication and diversity of target. The 2...
https://blog.comodo.com/it-security/advanced-persistent-threats-everyone-risk/
Reading Time: 2 minutes The company that made the phrase “You’ve got mail” famous is now saying that if “you’ve got AOL mail” you better change your password and be on the lookout for...
https://blog.comodo.com/it-security/youve-got-spam-aol-data-breach-tied-wave-phishing/
Reading Time: 2 minutes Last week, a Federal court affirmed the right of the US Federal Trade Commission (FTC) to sue companies who have suffered a data breach for failure to comply with federal ...
https://blog.comodo.com/it-security/the-ftc-one-more-concern-of-a-data-breach/
Reading Time: 3 minutes The very existence of the United States as a nation can be traced back to a protest movement against taxes. The colonists expressed their objection to a tax on tea by seiz...
https://blog.comodo.com/it-security/hacktivism-a-growing-concern-for-it/
Reading Time: 3 minutes In response to a reported vulnerability in the popular OpenSSL cryptographic library, Comodo is urging its customer, partners and all users of OpenSSL to apply the most re...
https://blog.comodo.com/e-commerce/heartbleed-bug-comodo-urges-openssl-users-to-apply-patch/
Reading Time: 1 minute Adobe released a security update today that deals with several critical faults in Flash player and AIR on Windows, Mac and Linux that could allow for third party code execu...
https://blog.comodo.com/it-security/adobe-patches-critical-flash-flaws/
Reading Time: 2 minutes As well as issuing SSL Certificate, a Trusted Root CA certificate can also be used to create another certificate, which in turn will then be used to issue SSL Certificates...
https://blog.comodo.com/e-commerce/what-are-chained-intermediate-certificates/
Reading Time: 2 minutes Microsoft is working furiously to convince users of Windows XP to abandon the venerable operating system before they end support on April 8th, warning of dire consequences...
https://blog.comodo.com/it-security/windows-xp-on-atms-should-we-be-worried/
Reading Time: 3 minutes Community banks and credit unions are taking a best practices approach to mutual authentication by opting for two factor solutions that offer the highest levels of securit...
https://blog.comodo.com/comodo-news/study-2-factor-authentication-like-money-in-the-bank/
Reading Time: 2 minutes It’s a sign of the times that when retailer Sally Beauty reported this week that “fewer than 25,000” cardholders were impacted by a recent data breach it was met wit...
https://blog.comodo.com/it-security/sally-beauty-cardholder-data-compromised/
Reading Time: 4 minutes Networks and personal computers are under continuous assault from hackers. The types of attacks vary widely in complexity and severity, but hackers generally have one of...
Reading Time: 3 minutes BredoLabs is the name of both a trojan horse program and the largest botnet ever discovered. The botnet has been broken up, for the most part, but variations of the troj...
https://blog.comodo.com/it-security/bredolabs-a-classic-botnet-story/
Reading Time: 2 minutes Microsoft is treating Windows XP more as a computer bug to be eradicated than one its most successful products ever. Over 12 years after the launch of Micrsoft’s Windows...
Reading Time: 2 minutes We have been very proud of the performance of Comodo Internet Security in the Matousec.com “Proactive Internet Security Challenge 64” over the past year. It’s worth ...
Reading Time: 3 minutes “I’m from the government and I’m here to help”. You may know that this statement is often listed among “The World’s Greatest Lies”, along with “The check i...
https://blog.comodo.com/it-security/us-cert-a-friend-against-cyber-attacks/
Reading Time: 3 minutes All Americans know that, according to our Declaration of Independence, we all have a right to “Life, Liberty and the pursuit of property”. Oops! That’s not the Decla...
https://blog.comodo.com/it-security/the-internet-and-property-rights-who-is-looking-out-for-you/
Reading Time: 3 minutes In the late 80’s and 90’s, most of the projects I was involved with were about converting paper based systems to computer entry, mostly PCs. In those days, it was very...
https://blog.comodo.com/it-security/data-is-your-most-precious-asset/
Reading Time: 2 minutes According to a Reuters report, an unidentified hacker seized control of one of the servers within the BBC network. The public broadcaster couldn’t find the culprit immed...
https://blog.comodo.com/it-security/hacker-spoils-bbc-christmas/
Reading Time: 2 minutes We have a running debate here at Comodo as to whether to use “Low Cost SSL” or “Cheap SSL” in referring to our SSL Certificates. My friends who like to use “chea...
https://blog.comodo.com/it-security/cheap-and-high-quality-not-an-oxymoron-at-comodo/
Reading Time: 2 minutes In recent years, a combination of Onion routing and the Tor network have allowed users stay hidden with great internet privacy. This is appealing to many people concerned ...
https://blog.comodo.com/it-security/tor-the-darkside-of-internet-privacy/
Reading Time: 3 minutes A botnet, a network of unwillingly controlled computers, is sometimes called a Zombie network. That’s because, like “real zombies” the computer owners aren’t awar...
https://blog.comodo.com/it-security/kelhios-the-vampire-of-botnets/
Reading Time: 2 minutes When we think of an “arms race” we usually think of advances in weaponry that cause death and destruction. It seems that there is a very different type of arms race un...
https://blog.comodo.com/it-security/cyber-arms-race-heats-up/
Reading Time: 2 minutes Internet site security requires a layered approach, at least if you want to sleep well at night! No single layer provides 100% protection. Encryption ensures that no one c...
https://blog.comodo.com/it-security/site-security-there-is-no-magic-key-for-protection/
Reading Time: 3 minutes The Domain Name System is fundamental to the functioning of the internet and works so well that we rarely consider how it works. Most people do not even realize that we ...
https://blog.comodo.com/it-security/managed-dns-its-time-has-come/
Reading Time: 2 minutes As the country begins the full implementation of the Affordable Care Act, which coincides with the government effort to digitize medical records, it is disconcerting to no...
https://blog.comodo.com/it-security/is-your-healthcare-data-safe-with-the-government/
Reading Time: 3 minutes Comodo Deploys AntiSpam Gateway for Edward F. Bukaty, III Law firm to Provide Proactive Spam Filtering, Increased Productivity and Protection from Email Based Virus & Malw...
Reading Time: 3 minutes “You are being watched. The government has a secret system: a machine that spies on you every hour of every day.” This is from the opening voice over of one of my favo...
Reading Time: 2 minutes The controversy and privacy concerns over collecting big data still surrounds the national security agencies. While the NSA is a government project, a new report indicate ...
https://blog.comodo.com/it-security/nsa-grade-surveillance-software-being-sold-to-companies/
Reading Time: 1 minute Web servers that permit users to inject new negotiations into ongoing secure sessions may allow interlopers to inject themselves into encrypted Internet transmissions. A co...
https://blog.comodo.com/it-security/tls-encryption-with-outdated-server-software-risky/
Reading Time: 2 minutes GitHub, the web hosting and code repository firm, is focusing attention on the importance of strong passwords for Internet security. You may have noticed that more and mor...
https://blog.comodo.com/malware/github-attack-highlights-importance-of-strong-passwords/
Reading Time: 2 minutes It seems the government is great at collecting data but not very good at protecting it. The FBI recently reported that the Anonymous activist hacker group is believed to h...
https://blog.comodo.com/it-security/adobe-breach-led-anonymous-to-spy-on-fbi/
Reading Time: 2 minutes If you have no idea about medical identity theft, you would probably say that there’s nothing wrong in taking your medical records. Don’t assume that they’re taking ...
https://blog.comodo.com/it-security/why-are-medical-records-becoming-a-target-for-id-thieves/
Reading Time: 2 minutes Adobe has successfully found and patched critical vulnerabilities found in their programs on Windows, Mac and Linux. The popular services from the company including Flash ...
https://blog.comodo.com/it-security/adobe-fixes-flash-player-and-cold-fusion-vulnerabilities/
Reading Time: 1 minute A router can be a gateway to the wonders of the internet. Unfortunately, it can also be a doorway through which hackers can invade your computer.Cross Site Scripting (XSS) ...
https://blog.comodo.com/it-security/new-vulnerabilities-found-in-d-link-routers/
Reading Time: 2 minutes You know the web, but do you know the “deep web”? The term “deep web” refers to web pages that are dynamically created and, therefore, not indexed by search engine...
https://blog.comodo.com/it-security/silk-road-rising-the-ebay-of-illegal-goods-gets-second-life/
Reading Time: 3 minutes “Revolution” is a TV show that depicts Americans struggling to restore society after it collapses in the wake of the power going off everywhere. In this scenario, a go...
https://blog.comodo.com/it-security/where-will-you-be-when-the-lights-go-out/
Reading Time: 5 minutes You may have heard of the latest virus, CryptoLocker, by now. The virus is a form of ransomware, a class of malware that, once installed on a system, restricts access to t...
https://blog.comodo.com/it-security/cryptolocker-virus-best-practices-to-ensure-100-immunity/
Reading Time: 4 minutes In The Walking Dead, zombies suck brain matter in a frenzied hunger, completely unaware of what they’re doing – driven only by the need to feed on your brain (and othe...
https://blog.comodo.com/it-security/how-to-survive-a-zombie-apocalypse-on-your-computer/
Reading Time: 2 minutes Would you like to be a hacker, but only want to work for the good guys? With the rapid increase in cyber-attacks, governments and businesses around the world are rushing t...
https://blog.comodo.com/it-security/so-you-want-to-be-a-cyber-warrior-prospects-are-good/
Reading Time: 2 minutes Employing encryption strategies needs to be an everyday part of life due to the widespread use of mobile computing and modern storage technologies. It is essential for mod...
https://blog.comodo.com/it-security/deploying-encryption-strategies-in-everyday-use/
Reading Time: 2 minutes How does a system know you are really you? How to answer that question is becoming an increasingly urgent problem. Hacking is on the rise and the majority of security expe...
https://blog.comodo.com/it-security/are-pills-and-tattoos-the-next-step-in-password-authentication/
Reading Time: 2 minutes Besides using Comodo Internet Security, the best way to protect your computer is to keep up with all of the security updates for you operating system. The Windows OS is th...
https://blog.comodo.com/malware/apple-rolls-out-security-updates-for-os-x-mountain-lion-safari/
Reading Time: 3 minutes There is a recent study by the “Anti Phishing Working Group” (APWG) being widely reported that phishing attacks were down 20% in 2012. When I first read about this I t...
Reading Time: 2 minutes With widespread security concerns over Java vulnerabilities, Oracle released an updated version titled Java 7 last Tuesday. The new standard edition version 7 update 40, J...
https://blog.comodo.com/it-security/oracle-updates-monitoring-security-features-for-java-7/
Reading Time: 2 minutes With the issues related to NSA a hot topic, the top Internet companies Google, Yahoo and Facebook have now requested permission to publish the number of requests made for ...
https://blog.comodo.com/it-security/nsl-transparency-requested-by-google-yahoo-and-facebook/
Reading Time: 3 minutes The internet is a boon for billions of people around the globe that has led to better connectivity, communication, job opportunities and changed the world for good. Howeve...
https://blog.comodo.com/it-security/internet-security-advice-keep-yourself-safe-from-snoopers/
Reading Time: 4 minutes When is a bad guy not a bad guy? When he is your friend pretending to be a bad guy in order to protect you. That’s what Penetration Testing is all about. Organizations...
https://blog.comodo.com/it-security/network-penetration-testing-the-extra-mile/
Reading Time: 2 minutes According to the noted National Security expert Bill Gertz, White House computers have been compromised by hackers, probably from China, but nothing classified was stolen ...
Reading Time: 2 minutes We all do things spontaneously and impulsively on the web. We open an email from someone we don’t know, click on a link we shouldn’t or download Kate Middleton’s top...
https://blog.comodo.com/it-security/kate-middleton-topless-pictures/
Reading Time: 1 minute If you happen not to have been a frequent reader of the Blog contributions I’ve published within the Social Media section of Comodo’s Web site (and picked up on Comodo�...
https://blog.comodo.com/it-security/march-is-gone-but-not-forgotten/
Reading Time: 4 minutes According to Forrester, the world’s preeminent source of statistical data on the Internet, American adults now spend an average of thirteen hours a week on the Web. That...
https://blog.comodo.com/it-security/outshining-chrome-the-comodo-dragon-internet-browser/
Reading Time: 2 minutes First came Symantec and Norton (January 18th Blog). Next up was McAfee (January 20th Blog). Now it’s VeriSign’s turn. As hard as it may be to believe, yet another aggr...
Reading Time: 2 minutes The rest of the Antivirus, Internet Security and PC Support industry may be headed for February, but it’s still the Season of Giving as far as Comodo is concerned. Sure,...
https://blog.comodo.com/it-security/comodo-has-extended-christmas/
Reading Time: 2 minutes Symantec’s Norton Internet Security Software. You can see their big-bucks commercials on your TV almost any night of the week. And find their full page ads in popular ma...
https://blog.comodo.com/it-security/what-happens-when-hype-prevails-over-science-the-norton-scandal/
Reading Time: 2 minutes If you’re the CEO, CFO, or head of IT at a small to medium size company, and your network antivirus subscription will soon expire, I’ve got a question for you: Did you...
Reading Time: 1 minute Seems like it’s never been harder than it is today to turn Internet shoppers into buyers. While Web use may grow every year, many e-commerce retailers are finding that th...
https://blog.comodo.com/other/the-science-of-improving-ecommerce-sales-in-uncertain-times/
Reading Time: 3 minutes In just the first year of a unique partnership, InCommon (incommon.org) and Comodo (Comodo.com) have issued tens of thousands of certificates to more than 120 colleges and...
Reading Time: 2 minutes excerpt from the article "Cyber Thieves" from the Sep 2010 issue of Reader's Digest. www.rd-india.com. Compiled by Srikanth The post Dialing for Dollars (With a ring of ...
Reading Time: 2 minutes Free Antivirus Software from Comodo Keeps You Protected Without the Hassle Comodo today announced its recommended solution for the recent media feud between Chinese Intern...
https://blog.comodo.com/it-security/comodo-advises-chinese-internet-firm-resolve-dispute/
Reading Time: 1 minute Devious CyberSecurity breaches are among the most serious criminal threats facing the country today. Howard Schmidt, America’s CyberSecurity Czar pointed this out at the ...
https://blog.comodo.com/it-security/white-house-reveals-cybersecurity-plans/
Reading Time: 1 minute Managing Endpoint Security has become more complicated for IT personnel. Trends indicate that endpoint security is only going to get more complex as time goes on. Malware t...
Reading Time: 1 minute Comodo Internet Security 4.0 is even more technologically advanced than ever before. 4.0 comes not only with Comodo’s award-winning Firewall, but also with our Defense+ H...
https://blog.comodo.com/it-security/cybersecurity-just-got-stronger/
Reading Time: 1 minute 2009 began with the biggest data breach in US history; the massive Hartland Payment System Credit Card Theft. This data breach affected the direction of both online securit...
https://blog.comodo.com/it-security/security-predictions-2010/
Reading Time: 1 minute In response to huge data breaches in the recent past, Massachusetts is about to enact the most rigorous data protection law in US history. The law details security measures...
https://blog.comodo.com/it-security/massachusetts-announces-a-data-security-law/