Generative Data Intelligence

Tag: hack

Cybercrime on a Colossal Scale

Reading Time: 3 minutesSurely there are very few in the US, or among Internet-connected citizens elsewhere, who are not aware of the massive...

It’s Now 1984 In Britain, Privacy No Longer Exists There

Britain just did the unthinkable, pushing the limits of government power under the guide of protection. The government approved the most extreme,...

SECURITY IN THE TIMES OF IoT

Reading Time: 3 minutesIoT: Unprecedented expansion Internet of Things (IoT) is now part of our daily life. The internet has pervaded our day-to-day lives...

Four genuine blockchain use cases

Where shared ledgers add real value in enterprise IT Almost a year after first releasing MultiChain, we’ve learnt a huge amount about how blockchains, in...

How Landing.jobs Gains An Edge Over Their Competition With Unbabel

In this series, we look at how our customers are using Unbabel to succeed in international markets and eventually, take over the world.Landing.jobs...

BitDefender Hacked

Reading Time: 1 minuteBitDefender, the well-known IT security firm, fell victim to a data breach in which hackers stole critical customer data. A...

Comodo is the Number One Digital Certificate Authority in the World

Reading Time: 2 minutesIt seems Symantec has taken notice of Comodo earning the #1 position in SSL Certificate Authority market share based on...

World War III Has Begun? Beware a Twitter Hack Hoax

Reading Time: 2 minutesTwitter hacks have become increasingly common and several high profile hoaxes raise serious questions about Internet Security. On Friday the Twitter...

Grinch Linux Bug Threatens IT’ville!

Reading Time: 2 minutesIt’s the Grinch that threatens your Linux! A bug in Linux dubbed “the Grinch” has been revealed that could allow a...

Hollywood Whodunit: Who Hacked Sony?

Reading Time: 3 minutesMysteries are the most popular genre in books, movies and films. Everyone loves to solve a mystery and we now...

Webcam Vulnerability: Who is Watching Whom?

Reading Time: 2 minutesThe first video phone was a sensation at the 1939 World’s Fair, and again a quarter century later at the...

Warning! RATS Attacking Mobile Devices

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app When it comes to securing a digital device, antivirus is...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?