Generative Data Intelligence

Cyber Security

Comodo Technical Report: Android OBAD Trojan Virus

Reading Time: 1 minuteUntil recently, it has been conventional wisdom that the operating systems for mobile devices are much safer than for desktop...

Cyber Crime and the Case for Auto Sandboxing

Reading Time: 2 minutesEvery computer, laptop, tablet and mobile phone connected to your network represents a vulnerable endpoint for viruses, worms, spyware, rootkits,...

How to Use CIS Protocol Handlers

Reading Time: 2 minutesDid you know that COMODO Internet Security has its own protocol handlers that allow you to perform certain tasks from...

Virtual Kiosk 101: How About a Virtual Chromebook?

Reading Time: 2 minutesLast week, there was a lot of buzz about the new Chromebook Pixel released by Google. If you haven’t heard...

Comodo Introduces Industry Changing Endpoint Security Solution

Reading Time: 2 minutesComodo announced today their latest solution for centralized administration of security, including antivirus protection of endpoints. Comodo Endpoint Security Manager...

Comodo Internet Security 2013: A Hit with the Critics!

Reading Time: 2 minutesProducing a major software upgrade is a lot like producing a Broadway show. You write it, practice in the test...

Matousec: Comodo is Number 1, again!

Reading Time: 2 minutesIt was with great pride last week that we learned that Comodo Internet Security is once again at the top...

Java Zero-Day Exploits: Why I am STILL Not Worried.

Reading Time: 3 minutesLast Saturday, I was surprised to see a news story that Homeland Security is recommending that all desktop users disable...

Malware using your computer to make digital money

Reading Time: 4 minutesElectronic money (e-money) is being used more and more often by people to make online purchases. And sure as night...

Password protected archives help malware evade detection

Reading Time: 4 minutesIf you need to deliver or store confidential documents over the Internet, then placing them inside a password-protected, self-extracting ‘archive’...

Anatomy of a Trojan: TrojWare.Win32.TrojanSpy.Volisk.a

Reading Time: 5 minutesAs part of Comodo Labs’ ongoing analysis of “Digital Signature” (confirming software author and guaranteeing computer program code hasn’t been...

Obama and Romney Finally Agreed on Something

Reading Time: 2 minutesNovember 6th is upon us, which in the United States means it is Election Day. And it isn’t just any...

Latest Intelligence

spot_img
spot_img