Generative Data Intelligence

Tag: android

Free Amazon Gift Card? Just Say No!

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Android users throughout North American are being text message...

FREAK Attack Warning: Apple and Google Devices Most Vulnerable

Reading Time: 2 minutesAn SSL/TLS vulnerability has been identified that attackers could use to downgrade the cryptography of HTTPS connections to one vulnerable...

Stolen Bank Laptop Highlights Risks of Mobile Computing

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app On January 26th, a laptop was stolen from a...

AV-Test Labs: High Marks for Comodo Mobile Security

Reading Time: 1 minuteUpdate: check the latest version of Comodo’s free mobile security app During January 2015 AV-Test Labs, the prestigious independent testing...

Verizon Mobile User Email Accounts Vulnerable

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app If you use Verizon Mobile, your email account may...

Grinch Linux Bug Threatens IT’ville!

Reading Time: 2 minutesIt’s the Grinch that threatens your Linux! A bug in Linux dubbed “the Grinch” has been revealed that could allow a...

Comodo Mobile Device Management 3.0: Get Control of BYOD Today!

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app Does your head hurt at the mere mention of BYOD?...

Understanding the Android SMS Virus “Selfmite”

Reading Time: 3 minutesSelfmite is a Worm, a category of computer virus. A worm contains malicious code that uses system networks to replicate...

Oracle Battles BASH Bug with Much Work Left to Do

Reading Time: 1 minuteOracle has released security updates to address BASH bug vulnerabilities found across multiple products. However, Oracle also included in its...

BASH Update: Apple and IT Scramble to Deal with BASH Bug

Reading Time: 1 minuteIT is on high alert to deal with a fault in the BASH command interpreter found on Unix OS variants...

Report: Mobile Devices can be Hijacked

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app Recently researchers from both the University of Michigan and the...

Warning! RATS Attacking Mobile Devices

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app When it comes to securing a digital device, antivirus is...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?