Generative Data Intelligence

Tag: email

Target Data Breach: PCI Scanning More Important Than Ever

Reading Time: 3 minutes Retailers, like Target,  that accept bank cards are required to adhere to a strict set of standards for protecting the...

Social Engineering: Fake Messages Plague Facebook

Reading Time: 1 minuteThere are some signs that the incredible growth of Facebook has peaked, but with over one billion subscribers it has...

Comodo Announces Enhancements to Storage Solutions

Reading Time: 3 minutes Comodo  announced  today  that our range of backup and cloud storage solutions have undergone recent  enhancement.  The Comodo Cloud...

Target Data Breach: Should You Panic?

Reading Time: 2 minutes If you used a credit or debit card at a Target department store between November 27th and December 15th,...

Cheap SSL and High Quality: Not an Oxymoron at Comodo

Reading Time: 2 minutesWe have a running debate here at Comodo as to whether to use “Low Cost SSL” or “Cheap SSL” in...

The Darkside of Internet Privacy: Tor and Chewbacca

Reading Time: 2 minutesIn recent years, a combination of Onion routing and the Tor network have allowed users stay hidden with great internet...

Code Signing Certificates: Do Not Develop Software Without Them

Reading Time: 3 minutesCode signing certificates from a trusted certificate provider allow developers to digitally sign their software so that customers know the...

Browsing in the Sandbox: Its Time Has Come with Comodo

Reading Time: 2 minutesHardly a day goes by where we don’t learn about a new exploit to a major system that hackers use...

Bitcoins: Hackers Target Virtual Currency

Reading Time: 3 minutesOpinions on Bitcoin, the electronic payment method vary widely. To some, it represents no less than the dawning of a...

Free APT Assessment: Are You Under Attack?

Reading Time: 2 minutesHistorically, hackers have cast a wide net.  They put viruses into “the wild” and  where they end up nobody actually...

Digital Email Certificates: Is Your Email Worth Protecting?

Reading Time: 2 minutesHow important is your email communication? Would it be a problem if someone intercepted it? What if someone modified it...

Kelhios: The Vampire of Botnets

Reading Time: 3 minutesA botnet, a network of unwillingly controlled computers, is sometimes called a Zombie network. That’s because, like “real zombies” the computer...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?