hackergroup-small

Hacktivism a Growing Concern for IT

The very existence of the United States as a nation can be traced back to a protest movement against taxes. The colonists expressed their objection to a tax on tea by seizing quantities of it and dumping it into Boston Harbor, the famous Boston Tea Party. Like just every oth...

heartbleed - Copy

Heartbleed Bug: Comodo Urges OpenSSL Users to Apply Patch

In response to a reported vulnerability in the popular OpenSSL cryptographic library, Comodo is urging its customer, partners and all users of OpenSSL to apply the most recent patched updates as soon as possible. Comodo will work with customers, partners, platform vendors an...

adobe fix

Adobe Patches Critical Flash Flaws

Adobe released a security update today that deals with several critical faults in Flash player and AIR on Windows, Mac and Linux that could allow for third party code execution and disclose private information. Four critical security vulnerabilities were highlighted in this...

chained - Copy

What are Chained (Intermediate) Certificates?

As well as issuing SSL Certificate, a Trusted Root CA certificate can also be used to create another certificate, which in turn will then be used to issue SSL Certificates. This can be seen from the example certificate shown below. The majority of SSL certificates in use aro...

ATM Terminal

Windows XP on ATMs: Should We Be Worried?

Microsoft is working furiously to convince users of Windows XP to abandon the venerable operating system before they end support on April 8th, warning of dire consequences when they halt the release of security patches. Most of this attention has been on individual XP users...

local bank - small

Study: 2 Factor Authentication Like Money in the Bank

Community banks and credit unions are taking a best practices approach to mutual authentication by opting for two factor solutions that offer the highest levels of security and authentication without sacrificing usability. To meet regulatory guidelines, many financial instit...

credit-cards

Sally Beauty Cardholder Data Compromised

It’s a sign of the times that when retailer Sally Beauty reported this week that “fewer than 25,000” cardholders were impacted by a recent data breach it was met with a sigh of relief. The exposure pales in comparison to the 100 million card holders impacted by the Target da...

hacker - small

Hackers: Why They Do It

Networks and personal computers are under continuous assault from hackers. The types of attacks vary widely  in complexity and severity, but hackers generally have one of three motives for compromising networks: Financial Fraud Political Reasons Personal Reasons Financial Re...

worry man

BredoLabs: A Classic Botnet Story

BredoLabs is the name of both a trojan horse program and the largest botnet ever discovered.  The botnet has been broken up, for the most part, but variations of the trojan are still infecting computers around the globe. A botnet is a network of compromised computers that ha...

winbug

Microsoft Offers Free XP Migration Tool as Support Deadline Looms

Microsoft is treating Windows XP more as a computer bug to be eradicated than one its most successful products ever. Over 12 years after the launch of Micrsoft’s Windows XP operating system, almost 30% of desktop users are using this venerable operating system. That speaks h...

Page 1 of 512345