hackers

Penetration vs Vulnerabilty Testing: Do You Know the Difference?

Every time you turn around, it seems there is another high profile data breach in the news that involves the compromise of cardholder data. The Target data breach alone may have compromised the data of more than half of all adult Americans. It has never been more important t...

at_mail

Comodo ASG Introduces Control of Incoming Mail by MTA & Archiving

The latest release of the Comodo Antispam Gateway (CASG) went live today with new features for controlling and archiving email. CASG allows you to remove malware, phishing links & spam from your email traffic before it gets to your network, establishing an effective pre-...

ID-100204119

Researcher IDs Vulnerabilities in Antivirus Software – Comodo Has the Solution

A researcher at the Singapore security firm COSEINC, Joxean Koret, is all over the technical news sites. He is being quoted almost everywhere, including on ComputerWorld and Inquire in the UK, about assertions that all of the major antivirus programs are vulnerable to attack...

shopping cart

eBay Data Breach: Class Action Suit Alleges Negligence

Data breaches that impact customers are costly in many ways. They are costly to cleanup. They are costly in the erosion of their customer’s confidence and business. They can kill e-Commerce. Increasingly, data breaches are costly in legal liabilities. The latest exampl...

Back to school

10 Back to School Internet Security Tips

Summer may be hard upon us, especially here in the very steamy New York area, but it is not too early to prepare for sending kids back to school. In fact, my daughter will return to College and my son will return to High School in just a month and we just did our back to sch...

cyber-attacks-ahead-small

Hackers, the Dark Side of the Tech Revolution

When I read about hackers and cyber criminals I often think of the old TV show Get Smart. After vanquishing a villain, Agent Maxwell Smart would often recite a lament that typically went “If only he had used his genius for good and niceness instead of evil.” If o...

firefox_live

Mozilla Releases Critical Security Updates for Firefox

The Mozilla has released security updates to address multiple vulnerabilities in their Firefox browser, including 11 critical fixes. Among the critical fixes is for a “use after free” bug. This is where a program referencing memory after it has been freed. This c...

lock-img

Understanding SSL Validation

Without SSL and SSL Certificates e-Commerce as we know it would not be possible. All SSL Certificates provide a secure connection between a browser and a server with all messages encrypted with Public Key Encryption (PKI) technology. So, why are there so many product offers...

data thief - small

How to Handle a Data Breach

There is a right way and a wrong way for an organization to handle a data breach. Unfortunately, they are sometimes the SAME way. The consensus in crisis management is that it is always best to get in front of a bad news story by getting it out quickly so you can frame the s...

sql vulnerability

vBulletin Announces Emergency Patch for SQL Injection Vulnerability

vBulletin Solutions announced this week that they have a critical emergency patch to their vBulletin forum software to fix an SQL injection vulnerability that could allow hackers to access the software’s databases. The vulnerability and fixes apply only vBulletin version 5....

computer bug

Report: Amazon Leads Malware Hosts and Getting Worse!

If you would really like to be infected by malware, the best place to go these days is amazon.com! According to a quarterly report for Q2 2014 by Solutionary’s Security Expert Research Team (SERT), Amazon hosts 41% of all malware identified by SERT’s honeynet. A honeynet is...

Page 1 of 3312345...102030...Last »