Generative Data Intelligence

Tag: DDoS

Top 10 Features of an Effective Endpoint Security Strategy 2020

Reading Time: 4 minutesWith overwhelming cyber attacks happening through malicious apps on mobile devices, security geeks are to intensify the endpoint security...

Your IoT Devices May Be Potential Targets to Malware That Wipe Out Data

Reading Time: 3 minutesCertain malware attacks have been discovered that target IoT (Internet of Things) devices and cause the wiping out of data...

Endpoint Security Glossary

Reading Time: 9 minutesHere’s an A to Z glossary of terms related to Endpoint Protection- A Advanced Persistent Threat (APT) – An unauthorized person gaining...

SSL/PKI/X.509—Automated Digital Certificate Lifecycle Management Reduces Risk and Costs

Reading Time: 3 minutesWhile SSL/TLS certificates provide the backbone for information security—digital certificate management is going to get harder as enterprises turn to...

What I Learned This Week – 11/18/16

Another week of vast information consumption, headlines, breach reports, security bulletins and client concerns. Learning everyday in the security consulting business...

Massive Internet Outage Powered by IoT Devices

Reading Time: 2 minutesUsing hacked “Internet of Things” (IoT) devices, cyber criminals had launched a massive internet attack on the Internet infrastructure company...

When DDoS Attacks, Botnets Play Mischief

Reading Time: 2 minutesDDoS attacks (Distributed Denial of Service attacks) and the data breaches that accompany such attacks are of serious consequence; these...

OpenSSL Security Update Patches Denial of Service Vulnerability

Reading Time: 1 minuteOpenSSL has released updates patching eight vulnerabilities, one of which may allow an attacker to cause a Denial of Service...

Dark Wallet, What’s all the Fuss About?

Reading Time: 5 minutesIn the last few weeks, I have read a fair amount of press coverage about a new Bitcoin wallet application...

Project Shield: Google Plays Superhero, Selectively

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app A breakout hit TV series is this years is “Agent’s...

How To Survive A Zombie Apocalypse On Your Computer

Reading Time: 4 minutesIn The Walking Dead, zombies suck brain matter in a frenzied hunger, completely unaware of what they’re doing – driven...

Comodo SSL Affiliate The Recent RA Compromise

Reading Time: 3 minutesOn March 15th 2011, a Comodo affiliate RA was compromised resulting in the fraudulent issue of 9 SSL certificates to...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?