Zephyrnet Logo

Tag: vendors

Google Shifts Focus of Android to the Enterprise

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Google has signaled a shift in focus for its Android...

Homeland Security Reports Hacked Infrastructure with Weak Security

Reading Time: 2 minutesAccording to a new report by the Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), public facing control...

Heartbleed Bug: Comodo Urges OpenSSL Users to Apply Patch

Reading Time: 3 minutesIn response to a reported vulnerability in the popular OpenSSL cryptographic library, Comodo is urging its customer, partners and all...

5 Things to Know When Selecting Security Software

Reading Time: 3 minutesNow more than ever before, computer users need to take measures to protect themselves online, and choosing the right antivirus...

Why is SSL Certificate Browser Compatibility so Important?

Reading Time: 1 minuteSSL Certificates will only be recognized by a browser if the Root Certificate of the CA is present within the...

Join Comodo at MSPWorld Conf in Orlando– March 26th-28th

Reading Time: 2 minutes Comodo is proud to be a sponsor of this spring’s MSPWorld Conference in Orlando FL, March 26th through 28th. If...

Authentication Solutions: Beyond the Password

Reading Time: 2 minutesAuthentication solutions prevent fraudulent account access risks. They also enable compliance with many security, banking and privacy regulations. What is Authentication? Authentication...

Matousec’s Challenge

Reading Time: 2 minutes We have been very proud of the performance of Comodo Internet Security in the Matousec.com “Proactive Internet Security Challenge 64”...

Data Security: Protecting Your Most Precious Asset

Reading Time: 3 minutesIn the late 80’s and 90’s, most of the projects I was involved with were about converting paper based systems...

Comodo Dragon is Armed Against Malvertising

Reading Time: 2 minutes Malvertising The first time I saw the term I thought it was a typo. In fact, it is a term that...

Bitcoins: Hackers Target Virtual Currency

Reading Time: 3 minutesOpinions on Bitcoin, the electronic payment method vary widely. To some, it represents no less than the dawning of a...

Matousec: CIS Named the Ultimate Protection Machine

Reading Time: 2 minutesThe recent update to Comodo Internet Security (CIS) Premium 6.3.297838.2953 has turned CIS into the ultimate protection machine according to...

Latest Intelligence

spot_img
spot_img