Zephyrnet Logo

Tag: encryption

Content Verification Certificates and Why You Need Them

Reading Time: 2 minutesContent Verification Certificates (CVC) facilitate the verification of “web page content”, the essential requirement for trusted e-commerce services that are...

Stay Away from the Man in the Middle

Reading Time: 3 minutesWhen you were a kid, presuming that you have indeed grown up, did you ever play the game “Man in...

Understanding PGP in Mobile Phone Security

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app PGP stands for Pretty Good Privacy which is a software...

AV-Test Labs: Comodo Scores Perfect for Protection

Reading Time: 2 minutesStill perfect! Once again,  Comodo Internet Security Premium (CIS) software earned another 100% protection score in the most recent evaluation period...

CryptoLocker 2.0 – Are You Ready? We Are

Reading Time: 4 minutesWhile other security companies and their users are still struggling to deal with the infamous ransomware Cryptolocker, we have no...

Why Choose UC Certificates?

Reading Time: 1 minute If your organization uses an MS® Exchange 2010 or Office Communications Server environment, you can consolidate all of your certificates...

Cheap SSL and High Quality: Not an Oxymoron at Comodo

Reading Time: 2 minutesWe have a running debate here at Comodo as to whether to use “Low Cost SSL” or “Cheap SSL” in...

Browsing in the Sandbox: Its Time Has Come with Comodo

Reading Time: 2 minutesHardly a day goes by where we don’t learn about a new exploit to a major system that hackers use...

Site Security: There is No Magic Key for Protection

Reading Time: 2 minutesInternet site security requires a layered approach, at least if you want to sleep well at night! No single layer...

AV-Test Labs Scores Comodo as Perfect Protection Once Again

Reading Time: 2 minutesComodo announced last week that our Comodo Internet Security Premium (CIS) software earned a 100% protection score in the most...

NSA Grade Surveillance Software Being Sold to Private Companies

Reading Time: 2 minutesThe controversy and privacy concerns over collecting big data still surrounds the national security agencies. While the NSA is a...

TLS Encryption with Outdated Server Software Risky

Reading Time: 1 minuteWeb servers that permit users to inject new negotiations into ongoing secure sessions may allow interlopers to inject themselves into...

Latest Intelligence

spot_img
spot_img