With digital media, voices can be altered. An article in the July 24 Economist ("We've Got Rhythm") reports that new techniques to identify the speaker involve identifying vocal modulation. How long a speaker holds consonants versus vowels remains constant whether the voice is disgui...
Jul. 30, 2010 10:42 AM EDT Reads: 1,589
In September I mentioned that Michael Hickins had reported on phone spoofing with cell phones to avoid sanctions for calling to Iran. Now The Economist reports that Turkish Prime Minister Recep Tayyip Erdogan complains that “they eavesdropped on me for six years.” "They" may possibly b...
Nov. 26, 2009 12:30 PM EST Reads: 9,236
Comodo Backup 2.1 offers software wizards suitable for novice users, and advanced features like command line scripting, encryption and resource management options. Comodo Backup is available for free download.
Nov. 4, 2009 06:07 PM EST Reads: 6,453
Fans of the popular AETV series "Intervention" stage their own confrontation with a malware-ridden PC in a parody video from Comodo.
Oct. 15, 2009 12:23 PM EDT Reads: 1,983
Fewer merchants than you think make keeping your confidential information private and secure.
Sep. 23, 2009 05:17 PM EDT Reads: 2,177
I was already thinking about the insecurity of cell phone communications because Molly Dolesalek reported on them in Processor Magazine. "It's fairly easy to tap into a cell phone conversation, but the business world doesn't really understand that," Dunleavy says. For that reason, he b...
Sep. 22, 2009 07:15 PM EDT Reads: 7,536
www.FreeDownloadsPlace.com has reviewed Comodo's world-famous Comodo Internet Security, and now offers a free 30-day trial.
Jul. 14, 2009 04:19 PM EDT Reads: 7,880
Arthur Glazer of The Gainesville Times informs his readers about how they can protect themselves against phishing scams. Fortunately, Comodo offers tools that can help.
Jul. 8, 2009 01:51 PM EDT Reads: 3,860
The Wildlife Control Supplies blog announced that its website had chosen an EV SSL certificate from Comodo because "EV SSL Certificates provide third-party verification using a highly visual display that gives consumers confidence and builds trust in e-commerce."
Jul. 7, 2009 09:40 AM EDT Reads: 5,499
April 1 is over but the threat from Conficker is not. Byron Acohido describes how the poorly-understood virus now covers its tracks and pitches a fake "antivirus."
Apr. 29, 2009 09:25 AM EDT Reads: 1,788
Hackers can disrupt Internet communications in target countries by flooding Internet servers with bogus messages. Experts debate whether this disruption constitutes warfare in the absence of a declaration of war.
Feb. 25, 2009 06:15 AM EST Reads: 16,862
"Two key elements in managing federal documents on Federal Digital System are versioning and authentication."
Feb. 19, 2009 10:15 AM EST Reads: 5,055
Hacker releases a software tool that can steal information even from supposedly ''secure'' sites.
Feb. 19, 2009 10:00 AM EST Reads: 4,740
Malih Abdulhayoglu, in a column for SecurityFocus.com, urges readers to move away from traditional detection-based software and toward a prevention-based technology
Feb. 10, 2009 05:50 AM EST Reads: 7,271
Perspectives provides a secure method for Internet users to obtain information about certificates published by services such as SSL Web sites. The information includes historical data from multiple notary servers, creating what may be considered a quorum, and allows Internet users to m...
Feb. 10, 2009 05:50 AM EST Reads: 2,601