Time for Trust - Copy

Google Search May Favor SSL

Should Google favor sites with SSL in their search results? Matt Cutts thinks so. He is the very public head of Google’s Webspam team and works on search engine optimization issues. In recent weeks, Cutts has expressed his opinion at various conferences and public settings t...

manicure

Case Study: Zamborg.com Needs Help Assuring E-Commerce

Business Challenge Many customers who are interested in buying a product off a new website feel unsure about the website’s authenticity. They worry that their information is not secure on the web, and that some websites may be used for scams. Even as the web’s presence conti...

check - Copy

SSL Validation Methods: Not all CAs are the Same

When obtaining an SSL Certificate, the Certificate Authority (CA) performs a verification of the requesting organizations identity that will vary depending on the level of authentication that type of certificate requires. While CA’s offer the same levels of authenticat...

heartbleed - Copy

Heartbleed Bug: Comodo Urges OpenSSL Users to Apply Patch

In response to a reported vulnerability in the popular OpenSSL cryptographic library, Comodo is urging its customer, partners and all users of OpenSSL to apply the most recent patched updates as soon as possible. Comodo will work with customers, partners, platform vendors an...

hacker in monitor

Comodo AV Labs Identifies Dangerous Zeus Banking Trojan Variant

Comodo Antivirus Labs has identified a new and extremely dangerous variant of the Zeus banking Trojan. Hackers use Zeus to launch attacks that obtain the login credentials of visitors to online banking sites and commit financial fraud. The significance of this variant is the...

chained - Copy

What are Chained (Intermediate) Certificates?

As well as issuing SSL Certificate, a Trusted Root CA certificate can also be used to create another certificate, which in turn will then be used to issue SSL Certificates. This can be seen from the example certificate shown below. The majority of SSL certificates in use aro...

check

When It Comes to Reliability, Comodo Passes the Test!

Recently, we reviewed a document of best practices in deploying SSL Certificates published by Qualys, a prominent security company.  Their document had some very good advice. In particular, we agree whole heartedly with their recommendation that an SSL user should “obtain ce...

Target - small

Target Data Breach: PCI DSS Auditor in Lawyer’s Crosshairs

Retailers who accept credit cards must periodically demonstrate that they are in compliance the Payment Card Industry Data Security Standards (PCI DSS). Large retailers are required to undergo periodic audits by independent auditors, called qualified security assessors (QSAs...

global key - Copy

Why is SSL Certificate Browser Compatibility so Important?

SSL Certificates will only be recognized by a browser if the Root Certificate of the CA is present within the “trusted Root Certificates” store of the browser. CA Root Certificates are added into the trusted Root Certificate store by the browser or operating syst...

hand authentication - small

Authentication Solutions: Beyond the Password

Authentication solutions prevent fraudulent account access risks. They also enable compliance with many security, banking and privacy regulations. What is Authentication? Authentication describes the verification process websites use to determine if each site visitor actuall...

Page 1 of 612345...Last »