Generative Data Intelligence

Tag: web

Case Study: Zamborg.com Needs Help Assuring E-Commerce

Reading Time: 4 minutes Business Challenge Many customers who are interested in buying a product off a new website feel unsure about the website’s authenticity....

Hacktivism a Growing Concern for IT

Reading Time: 3 minutesThe very existence of the United States as a nation can be traced back to a protest movement against taxes....

Heartbleed Bug: Comodo Urges OpenSSL Users to Apply Patch

Reading Time: 3 minutesIn response to a reported vulnerability in the popular OpenSSL cryptographic library, Comodo is urging its customer, partners and all...

Adobe Patches Critical Flash Flaws

Reading Time: 1 minuteAdobe released a security update today that deals with several critical faults in Flash player and AIR on Windows, Mac...

Comodo AV Labs Identifies Dangerous Zeus Banking Trojan Variant

Reading Time: 4 minutesComodo Antivirus Labs has identified a new and extremely dangerous variant of the Zeus banking Trojan. Hackers use Zeus to...

What are Chained (Intermediate) Certificates?

Reading Time: 2 minutesAs well as issuing SSL Certificate, a Trusted Root CA certificate can also be used to create another certificate, which...

Filing Tax Returns? Look for the Green Browser Bar

Reading Time: 1 minuteComodo advises taxpayers who file individual income tax returns online through an Authorized IRS e-file provider to be sure that...

Windows Defender: Minimal Defense, Maximum Risk

Reading Time: 3 minutesIf you are confused about what Antivirus protection is provided by Windows, don’t feel bad. Microsoft has changed its strategy...

Windows XP on ATMs: Should We Be Worried?

Reading Time: 2 minutesMicrosoft is working furiously to convince users of Windows XP to abandon the venerable operating system before they end support...

Target Data Breach: PCI DSS Auditor in Lawyer’s Crosshairs

Reading Time: 2 minutesRetailers who accept credit cards must periodically demonstrate that they are in compliance the Payment Card Industry Data Security Standards...

Comodo ModSecurity Rules & LiteSpeed: Perfect Together

Reading Time: 2 minutesComodo announced today the initial release of its free Comodo ModSecurity Rules for the LiteSpeed Web Server. ModSecurity rules are...

Hackers: Why They Do It

Reading Time: 4 minutesNetworks and personal computers are under continuous assault from hackers. The types of attacks vary widely  in complexity and severity,...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?