Reading Time: 3 minutesCybercriminals’ big hunt for users’ credentials is gaining momentum rapidly. Their strategy usually stays the same: get attention of the...
Reading Time: 2 minutesAn SSL/TLS vulnerability has been identified that attackers could use to downgrade the cryptography of HTTPS connections to one vulnerable...
Reading Time: 1 minuteApple has released a Safari security update to address vulnerabilities which could allow an attacker to execute arbitrary code or...
Reading Time: 5 minutesAs part of Comodo Labs’ ongoing analysis of “Digital Signature” (confirming software author and guaranteeing computer program code hasn’t been...
Reading Time: 4 minutesAccording to Forrester, the world’s preeminent source of statistical data on the Internet, American adults now spend an average of...