Generative Data Intelligence

Tag: Authentic

Sensitive Data on a U.S. Air Force Drone Breached Through Home Router Vulnerability

Reading Time: 4 minutesDrone aircraft are some of the U.S. Air Force’s deadliest weapons. Information on how to operate them can...

Ransomware Served Through Online Ads

Reading Time: 3 minutesCyber criminals have resorted to another sophisticated way of infecting user systems with ransomware and other malware. Malvertising or compromised...

Comodo Detects New Family of Sophisticated Financial Malware

Reading Time: 3 minutesComodo Threat Research Labs (CTRL) has announced that it has detected a new family of financial malware dubbed as “Gugi/Fanta/Lime”....

Massive Cybersecurity Breach at Yahoo

Reading Time: 3 minutesOn Sep 22, 2016, Yahoo issued a press release: “A recent investigation by Yahoo! Inc. has confirmed that a copy...

FROM THE COMODO LABS: DHL Customers Being Targeted in New Phishing Email Scam

Reading Time: 4 minutesWith the holiday season fast approaching, the shipping of packages and gifts will reach a fever pitch over the next...

FROM THE COMODO LABS: Apple IDs Being Targeted In New Global Phishing Email Scam

Reading Time: 3 minutesThe Comodo Antispam Labs (CASL) team has identified a new global phishing threat, targeted at all businesses and...

$46million Stolen in Cyberheist – don’t let this be your company

Reading Time: 2 minutesIt has been reported that networking firm Ubiquiti Networks was the victim of cyber theft, where more than $46million was...

Boiler Spring Savings Protects Customers with Comodo

Reading Time: 3 minutesBoiling Springs Savings Bank: Financial Institution introduces SVT technology that authenticates web content to protect critical customer information in online...

Case Study: Zamborg.com Needs Help Assuring E-Commerce

Reading Time: 4 minutes Business Challenge Many customers who are interested in buying a product off a new website feel unsure about the website’s authenticity....

Mobile Antivirus Prevention Top Tips

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app There are tons of security tips provided online for the...

Your e-commerce site needs a hacker-sniffing bloodhound.

Reading Time: 2 minutesThe No. 1 reason why an e-commerce Web site customer doesn’t complete a buying transaction is WORRY. That uncomfortable apprehension...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?