Zephyrnet Logo

Tag: security

What are Chained (Intermediate) Certificates?

Reading Time: 2 minutesAs well as issuing SSL Certificate, a Trusted Root CA certificate can also be used to create another certificate, which...

Filing Tax Returns? Look for the Green Browser Bar

Reading Time: 1 minuteComodo advises taxpayers who file individual income tax returns online through an Authorized IRS e-file provider to be sure that...

Comodo Mobile Security for Android: Competitor Comparisons

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Mobile Devices, such as smartphones and tablets, are the hottest...

Is that IRS Email Really from a Phisherman?

Reading Time: 2 minutesMillions of Americans are working hard these days to finalize their tax returns before the annual April 15th deadline. With...

Windows Defender: Minimal Defense, Maximum Risk

Reading Time: 3 minutesIf you are confused about what Antivirus protection is provided by Windows, don’t feel bad. Microsoft has changed its strategy...

Windows XP on ATMs: Should We Be Worried?

Reading Time: 2 minutesMicrosoft is working furiously to convince users of Windows XP to abandon the venerable operating system before they end support...

When It Comes to Reliability, Comodo Passes the Test!

Reading Time: 1 minuteRecently, we reviewed a document of best practices in deploying SSL Certificates published by Qualys, a prominent security company.  Their...

Target Data Breach: PCI DSS Auditor in Lawyer’s Crosshairs

Reading Time: 2 minutesRetailers who accept credit cards must periodically demonstrate that they are in compliance the Payment Card Industry Data Security Standards...

Comodo ModSecurity Rules & LiteSpeed: Perfect Together

Reading Time: 2 minutesComodo announced today the initial release of its free Comodo ModSecurity Rules for the LiteSpeed Web Server. ModSecurity rules are...

5 Things to Know When Selecting Security Software

Reading Time: 3 minutesNow more than ever before, computer users need to take measures to protect themselves online, and choosing the right antivirus...

Browser Hijacking: Don’t be a Victim

Reading Time: 2 minutesOne of the most annoying and often dangerous computer compromises is browser hijacking. You probably have experienced it. A program...

Firefox 28 Provides Critical Security Patches

Reading Time: 1 minuteFirefox 28, released on Tuesday, provided numerous important security fixes including 5 for flaws identified in the recent Pwn2Own competition. Pwn2Own...

Latest Intelligence

spot_img
spot_img