Keeping PCs Safe on the Internet

PC Security Journal

Subscribe to PC Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get PC Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

"If it's urgent enough to send in a business email, it's usually something you don't want others to see," said Melih Abdulhayoglu, Chief Security Architect and CEO of Comodo Group, Inc., a leading Internet security company. "Most emails are not secure messages. To a moderately skilled person, inside the organization or out, they are as easy to read or even to change, as a postcard written in pencil." Emails do not reach their recipients directly. The senders have no control over the route their emails take, from server to server, to their destinations. Anyone between the sender and recipient could intercept messages, read them, change them, redirect them, or delete them. "Email leaks are always humiliating when you finally detect them. And if your competition detects them first, you can lose valuable information." To allow email users to control their confidential mes... (more)

Comodo Internet Security Earns 5 Prestigious CNET Stars

Comodo's free pc security software, Comodo Internet Security, has earned five stars, the maximum number possible, at CNET/Download.com. Download.com, owned by CNET, a division of CBS Interactive, Inc., offers over 100,000 freeware, shareware and try-first download software packages, all of them tested to be spyware free. At Download.com visitors can read both the editor's review and user comments about free software products. Visitors may also download a copy of Comodo Internet Security for their own computers. One user commented I have been using this great security suite for 6 months now and I'm more than satisfied thus far. I strongly recommend Comodo Internet Security to everyone in need of comprehensive security for the PC, Laptop or netbook. Comodo, keep up the good work. Before giving the suite five stars, CNET Senior Associate Editor Seth Rosenblatt wrote I... (more)

Savvis and Cisco Deliver Private Clouds for the Enterprise

Visit Savvis Booth at Cloud Expo Savvis and Cisco announced an expanded relationship focused on the development of private clouds for the enterprise. Savvis will integrate the Cisco Unified Computing System (UCS) as the cornerstone of Savvis Symphony, Savvis' next-generation private clouds platform, previously dubbed Project Spirit, that will power the industry's first enterprise-class Virtual Private Data Center (VPDC) with multi-tiered security and quality of service capabilities. Cisco UCS unites computational, network, storage access, and virtualization into a scalable, modular architecture that is managed as a single system. The Cisco Unified Service Delivery solution optimally utilizes pools of resources within any given data center and applies them to any service offering as well as interconnects data center islands to further combine resources, which can si... (more)

Cloud Computing Transaction Monitoring

Cloud Expo on Ulitzer Web-wise, it’s a changed world from even a few years ago. The number of online transactions (defined as everything from an exchange of money, to searches, to downloads, etc.) has exploded because companies now use the Web to manage sales, marketing, communications, and product support strategies. Transactions have also grown via dynamic pages, secure Web sites, integrated search capabilities, and multimedia content. At the same time, transactions have become more complex. But, as rewarding as they are to business website owners, transactions are also risky – because there’s no guarantee that everything will go 100% smoothly. They can break down anywhere in the process, for example, from sluggish servers or a search engine breakdown. And when that happens your competitors are never far – just a click or two away. Fortunately, companies can take... (more)

This Week in Cloud, December 6, 2012: Cloud predictions for 2013, EMC & VMware’s new business unit, 1 in 5 employees use Dropbox. And more…

The Innovative CIO! The Innovative CIO: How IT Leaders Can Drive Business Transformation – the new book from Andi Mann and George Watt Cloud News The contributors to the Forrester Cloud Playbook have put together a list of the top 10 cloud predictions for 2013, according to this Forbes article. The analysts predict that we’ll see some of the following trends next year: Cloud and mobile will become one, we’ll stop equating cloud with AWS, and we’ll finally stop saying – “everything is going cloud.” VMware and EMC announced their plans to create a new business unit, the Pivotal Initiative, according to this InformationWeek article. The business unit will merge VMware and EMC’s cloud computing and big data products. A new report by Nasuni reveals that 1 out of 5 employees use Dropbox to share and store work files even though their organization’s IT department prohibits ... (more)

Comodo Adds Revolutionary SafeDelete to Comodo System-Cleaner

Purging a pc of old, unwanted files is an essential but nerve-wracking part of computer maintenance. When cleaning a computer system some files are hard to identify. A miscellaneous-looking file that appears superfluous may actually be supporting necessary operations. Comodo's new system cleaner enables computer users to store a back-up copy of their computer system just in case they make a mistake. Comodo System-Cleaner is the world's first file and registry cleaner to harness the power of 100% safe cleaning. It utilizes the revolutionary innovation of SafeDelete™, a feature that allows users to safely recover any files deleted in error. This advancement eliminates risk from the process of PC cleaning. Because the system cleaner is entirely risk-free, it can clean deeper, more thoroughly, and more completely than any other cleaner available. "PC users are afraid ... (more)

The Case For 3rd Party Software

If I had to classify the questions I get on a routine basis, among the first in the list would be “Why should I buy software for reason X when Microsoft has built it in free. X could be anything from firewall software for desktops through availability tools for SQL Server. It’s absolutely true that Microsoft builds a ton of great tools into their products these days, but that doesn’t mean you should rule out the need for 3rd-party solutions, and here’s why. Let’s take the case of anti-virus as an example. Windows 7 – Microsoft’s upcoming desktop OS platform – will not have a built-in anti-virus solution. However, Morro will be released by Microsoft as a no-cost anti-malware (anti-virus, anti-spyware, etc) that will be available free of charge. So, why are other players in the Windows anti-malware area still in business? First things first, not everyone will meet ... (more)

Cloud Security on Ulitzer: Cloud Computing and Self-Service Security

Cloud Security on Ulitzer Hat-tip to Gunnar for this link to Hoff's post on "Cloud Providers and Security “Edge” Services – Where’s The Beef?" So here’s the rub, if MSSP’s/ISP’s/ASP’s-cum-Cloud operators want to woo mature enterprise customers to use their services, they are leaving money on the table and not fulfilling customer needs by failing to roll out complimentary security capabilities which lessen the compliance and security burdens of their prospective customers. While many provide commoditized solutions such as anti-spam and anti-virus capabilities, more complex (but profoundly important) security services such as DLP (data loss/leakage prevention,) WAF, Intrusion Detection and Prevention (IDP,) XML Security, Application Delivery Controllers, VPN’s, etc. should also be considered for roadmaps by these suppliers. Think about it, if the chief concern in Cloud ... (more)

Putting a Price on Uptime

A lack of ability in the cloud to distinguish illegitimate from legitimate requests could lead to unanticipated costs in the wake of an attack. How do you put a price on uptime and more importantly, who should pay for it? A “Perfect Cloud”, in my opinion, would be one in which the cloud provider’s infrastructure intelligently manages availability and performance such that when it’s necessary new instances of an application are launched to ensure meeting the customer’s defined performance and availability thresholds. You know, on-demand scalability that requires no manual intervention. It just “happens” the way it should. Several providers have all the components necessary to achieve a “perfect cloud” implementation, though at the nonce it may require that customers specifically subscribe to one or more services necessary. For example, if you combine Amazon EC2 with ... (more)

Comodo Issues Ultra-Secure Browser, Comodo Dragon

Comodo has announced its new Internet browser, Comodo Dragon. Like Google Chrome, Comodo Dragon is constructed on the open-source Chromium Project browser. Dragon's enhancements increase security and protect user privacy. Comodo Dragon offers a new feature for Internet users. Websites all have digital certificates attesting to their identities, but some certificates offer more security than others. If Comodo Dragon encounters a Domain-only certificate, it warns the user that the website may not be reliable. Domain-only certificates are available to any webmaster at low cost and with no verification, providing no guarantee of authentication. With Comodo Dragon, information about online exploration stays as much as possible within the user's PC. Comodo Dragon does not transmit information about a browsing session to a remote server. Such a transmission exposes informa... (more)

The Hidden Costs of Internal Clouds

CloudSwitch Session at Cloud Expo in New York A public cloud can provide access to computing resources that many companies would otherwise never be able to afford. The arguments for the cloud are well-known by now, but remain compelling—no up-front costs, virtually unlimited computing power on demand, and highly efficient pricing where customers pay only for resources used. There’s also less pressure on corporate IT departments that are charged with managing the infrastructure and budgeting for new equipment to keep up with demand. But concerns about security and loss of control in public clouds have led to an alternative model—the internal cloud—that replicates the cloud environment inside the corporate firewall. Within these boundaries, enterprise users can provision computing resources as needed, using the cloud’s self-service capabilities while leveraging data c... (more)