20.7 C
New York

Cyber Security

BredoLabs: A Classic Botnet Story

Reading Time: 3 minutesBredoLabs is the name of both a trojan horse program and the largest botnet ever discovered.  The botnet has...

Microsoft Releases Critical Security Updates for IE and Windows

Reading Time: 1 minuteA series of security updates release by Microsoft on March 11th included fixes for a critical security flaw in...

Astonishing Leniencies Regarding Data Security

Reading Time: 2 minutesThe first protection that your data has is password against online data thieves as well as against the people...

Join Comodo at MSPWorld Conf in Orlando– March 26th-28th

Reading Time: 2 minutesComodo is proud to be a sponsor of this spring’s MSPWorld Conference in Orlando FL, March 26th through 28th....

Authentication Solutions: Beyond the Password

Reading Time: 2 minutesAuthentication solutions prevent fraudulent account access risks. They also enable compliance with many security, banking and privacy regulations.What is...

Target Data Breach: The Losses Mount on Many Fronts

Reading Time: 2 minutesThe losses due the Target data breach are just beginning to be tabulated. According to financial results for the...
Category Template CoinGenius Hosts Virtual Crypto Event The Road To Mass Adoption

Microsoft Offers Free XP Migration Tool as Support Deadline Looms

Reading Time: 2 minutesMicrosoft is treating Windows XP more as a computer bug to be eradicated than one its most successful products...

Content Verification Certificates and Why You Need Them

Reading Time: 2 minutesContent Verification Certificates (CVC) facilitate the verification of “web page content”, the essential requirement for trusted e-commerce services that...

Stay Away from the Man in the Middle

Reading Time: 3 minutesWhen you were a kid, presuming that you have indeed grown up, did you ever play the game “Man...

Understanding PGP in Mobile Phone Security

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security appPGP stands for Pretty Good Privacy which is a...

Apple Leaves Snow Leopard in the Cold, Users Vulnerable

Reading Time: 2 minutesUnlike their desktop/laptop rival Microsoft, Apple does not go out of its way to alert their user base that...

What Is Worm Autoit AARF?

Reading Time: 2 minutesWorm Autoit AARF comes from the family of Trojan infection which has a long history with the development of...
Category Template CoinGenius Hosts Virtual Crypto Event The Road To Mass Adoption

Recent articles

spot_img