Virtualization - Data Storage - Security

Katharine Hadow

Subscribe to Katharine Hadow: eMailAlertsEmail Alerts
Get Katharine Hadow via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Latest Blogs from Katharine Hadow
With digital media, voices can be altered. An article in the July 24 Economist ("We've Got Rhythm") reports that new techniques to identify the speaker involve identifying vocal modulation. How long a speaker holds consonants versus vowels remains constant whether the voice is disgui...
In September I mentioned that Michael Hickins had reported on phone spoofing with cell phones to avoid sanctions for calling to Iran. Now The Economist reports that Turkish Prime Minister Recep Tayyip Erdogan complains that “they eavesdropped on me for six years.” "They" may possibly b...
Comodo Backup 2.1 offers software wizards suitable for novice users, and advanced features like command line scripting, encryption and resource management options. Comodo Backup is available for free download.
Fans of the popular AETV series "Intervention" stage their own confrontation with a malware-ridden PC in a parody video from Comodo.
Fewer merchants than you think make keeping your confidential information private and secure.
I was already thinking about the insecurity of cell phone communications because Molly Dolesalek reported on them in Processor Magazine. "It's fairly easy to tap into a cell phone conversation, but the business world doesn't really understand that," Dunleavy says. For that reason, he b...
www.FreeDownloadsPlace.com has reviewed Comodo's world-famous Comodo Internet Security, and now offers a free 30-day trial.
Arthur Glazer of The Gainesville Times informs his readers about how they can protect themselves against phishing scams. Fortunately, Comodo offers tools that can help.
The Wildlife Control Supplies blog announced that its website had chosen an EV SSL certificate from Comodo because "EV SSL Certificates provide third-party verification using a highly visual display that gives consumers confidence and builds trust in e-commerce."
April 1 is over but the threat from Conficker is not. Byron Acohido describes how the poorly-understood virus now covers its tracks and pitches a fake "antivirus."
Hackers can disrupt Internet communications in target countries by flooding Internet servers with bogus messages. Experts debate whether this disruption constitutes warfare in the absence of a declaration of war.
"Two key elements in managing federal documents on Federal Digital System are versioning and authentication."
Hacker releases a software tool that can steal information even from supposedly ''secure'' sites.
Malih Abdulhayoglu, in a column for SecurityFocus.com, urges readers to move away from traditional detection-based software and toward a prevention-based technology
Perspectives provides a secure method for Internet users to obtain information about certificates published by services such as SSL Web sites. The information includes historical data from multiple notary servers, creating what may be considered a quorum, and allows Internet users to m...