Reading Time: 3 minutesYou may think that cyber-attacks are someone else’s problem. You would be wrong.
Cyber-attacks are growing in their number, sophistication and...
Reading Time: 4 minutesOn April 26th, Microsoft revealed that hackers are exploiting a critical vulnerability in their Internet Explorer browser to victimize users...
Reading Time: 4 minutes
Business Challenge
Many customers who are interested in buying a product off a new website feel unsure about the website’s authenticity....
Reading Time: 3 minutesIn response to a reported vulnerability in the popular OpenSSL cryptographic library, Comodo is urging its customer, partners and all...
Reading Time: 2 minutesRetailers who accept credit cards must periodically demonstrate that they are in compliance the Payment Card Industry Data Security Standards...
Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app
Developers of Replicant, an open source variant of Android, claim...