2 Results for

commtouch

Article

Only you can prevent phishing attacks

All the security software in the world can't put malware purveyors out of business. The weak link in any computer security scheme is the gray matter positioned between the monitor and the keyboard. Use it or lose.

By Oct. 10, 2011

Article

Report: Adobe Reader, IE top vulnerability list

New M86 Security Labs report says holes in Adobe Reader and Internet Explorer are targeted most by attackers.

By Jul. 14, 2010