Virtualization - Data Storage - Security

Katharine Hadow

Subscribe to Katharine Hadow: eMailAlertsEmail Alerts
Get Katharine Hadow: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories by Katharine Hadow

Comodo System-Cleaner Now Includes File, Registry Monitor Jersey City, NJ, October 29, 2009 - If only cleaning the office refrigerator were as easy as using Comodo System-Cleaner 2.1 on a sluggish PC. Like co-workers' leftovers, deleted and uninstalled files leave remnants of themselves behind, making it harder for computer CPUs to store the information they need. Comodo System-Cleaner identifies and removes these relics, swiftly freeing up space and memory for new applications. Software is often easy to install, prompting the computer user for everything it needs to run successfully on a PC. On the other hand, when the user decides that the software is no longer (or never was) useful and wants to uninstall it, the process is much more complex. The software may leave bits and pieces of itself to molder in obscure corners of the PC registry, like leftovers strewing san... (more)

Comodo Webinar Educates Aspiring e-Merchants

A February 12 online seminar presented by Comodo will tell e-merchants how to build their customer bases by increasing customer trust. The webinar will explain the basics of providing the secure website that online shoppers demand. It will also talk about ways to communicate security measures to customers, so they know that it is safe to entrust the site not only with their money, but with their personal information. "Comodo e-commerce customers who have implemented and communicated security techniques have seen dramatic increases in their conversion rates," said Melih Abdulhayog... (more)

New Application for Managing Self-Signed Certificates

Perspectives provides a secure method for Internet users to obtain information about certificates published by services such as SSL Web sites. The information includes historical data from multiple notary servers, creating what may be considered a quorum, and allows Internet users to make an informed decision as to whether the certificate is valid or not here. ... (more)

Innovating Staging of Two-Factor Authentication Succeeds for Rhode Island Bank

To prevent online fraud, financial institutions that offer online banking are required by the Federal Financial Insitutions Examination Council (FFIEC) to double-check that the person logging in to the system is a valid customer. When BankNewport in Rhode Island adopted a Two-Factor authentication plan, its concern was to make the transition as easy as possible on its customers. In addition to requiring online customers to use a password, the bank chose to install digital certificates from Comodo on each customer's computer. The process looked simple: the first time the customer tr... (more)

Andy Greenberg at Forbes.Com on Hacking SSL-Protected Sites

"On Wednesday, at the Black Hat security conference here, an independent hacker and security researcher who goes by the name Moxie Marlinspike announced that he would release a software tool for performing "man-in-the-middle" attacks on seemingly secure Web sites," stripping their SSL protection, reports Andy Greenberg at ... (more)