Welcome!

Virtualization - Data Storage - Security

Katharine Hadow

Subscribe to Katharine Hadow: eMailAlertsEmail Alerts
Get Katharine Hadow via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Katharine Hadow

Comodo code-signing certificates enable developers to sign Mozilla extensions or "Add-ons" for a wide variety of different operating systems such as Microsoft Windows, Mac OS X and Linux. Mozilla applications recognize XPIs as "trusted" when they are signed with a Comodo Code-Signing certificate. XPI (pronounced "Zippy") is short for "Cross Platform Install." XPI enables Developers to create installer modules for their programs meant to enhance Mozilla applications such as Firefox, Thunderbird, Sea Monkey and Sunbird. Comodo Code-Signing certificates verify and authenticate the entity that has created the XPI file, allowing end users to trust their execution. Most browsers will not accept action commands from downloaded code unless the code is signed by a trusted Certificate Authority. An example of a trusted code-signing certificate, this one has been issued by Como... (more)

Data Breaches Pain IT Executives

Jersey City, NJ, December 17, 2009 - The US unemployment rate is so high that two US Senators have introduced the Employ America Act, aiming to cut back on alien workers hired on H1-B visas. With a 10%+ jobless rate, there is a lot of talented competition for work. If an IT executive loses a job because of a data breach, he or she might be out of work for a long time—without benefits. IT executives at ChoicePoint, Inc., looked like heroes when they reacted swiftly to a potential data breach in 2005. More often, though, leaky data pipes lead to unpleasant consequences for the exe... (more)

Andy Greenberg at Forbes.Com on Hacking SSL-Protected Sites

"On Wednesday, at the Black Hat security conference here, an independent hacker and security researcher who goes by the name Moxie Marlinspike announced that he would release a software tool for performing "man-in-the-middle" attacks on seemingly secure Web sites," stripping their SSL protection, reports Andy Greenberg at Forbes.com. ... (more)

Attorneys Protect Email Communications with Comodo Secure Email

Patent-pending technology from Comodo allows attorneys and clients to communicate at the speed of the Internet and yet to protect their privileged communications easily. Without exchanging public keys, senders can encrypt confidential information in transit. Jersey City, NJ, May 05, 2009 - Attorneys sometimes need to transmit vast amounts of sensitive data, rapidly. If they choose to do so by email, they must consider that email, though convenient, is not secure Press release about Comodo Secure Email for Attorneys.. More information about Comodo Secure Email. ... (more)

Comodo Internet Security Suite "Notable Newcomer to the Security Arena"

Comodo Internet Security “A notable newcomer to the security arena.” by Michael J. Ross Computer viruses, worms, Trojan horses and other forms of malware pose just as much a threat now as they did during the 1980s, when personal computers became widespread, and before the advent of the Web. Back then, viruses were typically spread inadvertently from one computer to another via diskettes. In our current era, these virtual viruses have a far more widespread and efficient vector for dissemination: the Internet. People nowadays will send a program or other potentially infected files to... (more)