Comodo Desktop Security

Featured Posts

Steps Toward Online security

Summary The Internet is receiving all kinds of help it needs and deserves from individuals and businesses, when it comes to its security. Though just the beginning, Web's security is...

Cybersecurity Investment Carries More Weight Than Before After Latest Security Breaches

Summary A number of recent high-end data breaches that was followed by a rash of cyberattacks on leading retailers Target, Neiman Marcus, and Home Depot have turned the spotlight on...

United Nations Calls on Nations to Safeguard User Security and Privacy

Summary Recently, a United Nations(UN) panel approved a resolution that has its General Assembly call on countries to respect and safeguard the right to security and privacy in today's digital...

Apple’s iCloud Service Attacked in China

Summary Security experts have warned that encrypted passwords and personal information are at risk of being hacked from Apple iCloud service in mainland China. Law enforcement has a cyber issue...

Ways to Tighten Web Security

Summary Following the recent spate of high-profile data breaches and NSA debacle, it is no wonder businesses and public have become paranoid about cyber security. Here are some ways to...

Corporates Considering Hiring Ex-hackers as Cyber Security Pros

Summary The widening gap between cyber security experts and Internet security is pushing corporates to consider employing convicts and hackers according to new study. But some experts have opined that...

Cyber Crimes are Likely to Increase in the Future

Summary The Web has become a vital part of national life and global economic that governments, businesses, and individuals are prime targets for more threatening and frequent cyber attacks. A...

The Impact of Heartbleed

Summary The Heartbleed security exploit is one of the major security vulnerabilities and the widely used encryption programs, Secure Socket Layer (SSL), on the Web. Impact of Heartbleed About 39...

How SSL Acts as the Future of Web Security

Summary Our modern lives depend more on smaller devices but we expect our personal information to be safeguarded by them as it would be on our traditional systems. As technology...

How to Prevent Phishing Scams

Summary What is Phishing? Is the act of attempting to ascertain essential data such as usernames, encrypted passwords, and credit and/or debit card details by impersonating as a legitimate entity...
Page 1 of 2312345...1020...Last »