Reading Time: 1 minuteAccording to Homeland Security’s Computer Emergency Response Team (US-CERT), the Symantec Web Gateway contains SQL injection and cross-site scripting vulnerabilities.
Symantec...
Reading Time: 3 minutesFlags that signal the risk of identity theft include suspicious activity indicating that identity thieves may be using stolen information....
Reading Time: 1 minuteMicrosoft Internet Explorer 8 contains a use-after-free vulnerability that can allow a remote, unauthenticated attacker to execute arbitrary code on...
Reading Time: 2 minutesAccording to a new report by the Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), public facing control...
Reading Time: 3 minutesYou may think that cyber-attacks are someone else’s problem. You would be wrong.
Cyber-attacks are growing in their number, sophistication and...
Reading Time: 4 minutesOn April 26th, Microsoft revealed that hackers are exploiting a critical vulnerability in their Internet Explorer browser to victimize users...
Reading Time: 4 minutes
Business Challenge
Many customers who are interested in buying a product off a new website feel unsure about the website’s authenticity....
Reading Time: 3 minutesIn response to a reported vulnerability in the popular OpenSSL cryptographic library, Comodo is urging its customer, partners and all...
Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app
Mobile Devices, such as smartphones and tablets, are the hottest...