Comodo Desktop Security

Featured Posts

Hackers Target 13 More Financial Institutions Following JP Morgan Chase

Summary The scheme used in the breach of JPMorgan Chase that impacted 75 million accounts may have also severely affected 13 other financial institutions. Thirteen More Financial Institutions Impacted Evidences...

Ignoring SSL Leads to Losing Clients

Summary Google's recent announcement of an update to its search algorithms that will impact websites devoid of secure SSL certificates is making huge waves across the tech industry. But what...

Google and Apple Encryption Efforts – FBI Can Only Blame Themselves

Summary The Government of United States has been clearly unhappy over Google and Apple's efforts to boost smartphone encryption. The feds have accused that the Internet giants were going beyond...

iPhone Encryption Causes a Row Among Law Enforcement and Intelligence

Summary While devout Apple users pray for an unbending iPhone 6, the National Security Agency (NSA) and other law enforcement agencies have altogether a different concern. Apple's latest smartphone is...

It is All About Kill Switches

Summary Android and Windows Phone mobile OS, created by Google and Microsoft respectively, are all set to get a kill switch in their next version. The news came courtesy Attorney...

Curtains for Like-Gating As Facebook Bans the Function

Summary Social media giant Facebook has banned 'Like-Gating (Fan Gating ), a enticing marketing technique used by advertisers to artificially increase page likes. On its developers blog, the tech titan...

5 Steps to Improve Internet Security

Summary Many small and medium-sized enterprises (SME), and e-commerce entrepreneurs are in the notion that they are at risk from Internet crime. It is paramount that your customers feel safe...

10 benefits of EV SSL Certificates

Summary An extended validation (EV SSL) certificate works with high-security browsers to clearly identify a site's organizational identity. For example, if you use Google Chrome, Internet Explorer or Firefox, the...

How to Overcome Heartbleed Vulnerability in SSL

What is Heartbleed Bug: The Heartbleed Bug is a serious weakness which allows hacker to reduce managing risks, processing speed of the system, it also brings down the transmission of...

How to Prevent Credit Card Theft while shopping Online

Introduction: Internet has made our lives more easier and comfortable through some aspects like online shopping. When there are advantages there are equal disadvantages coming along our way. Identity theft...
Page 4 of 24« First...23456...1020...Last »