Generative Data Intelligence

Tag: hackers

Microsoft Reports Threat to Older Office Versions and Windows Vista

Reading Time: 1 minuteOn Tuesday, Microsoft warned that hackers are targeting Windows Vista and MS Office versions 2003 to 2010 to exploit a...

Microsoft to Leave Windows XP Users Unprotected

Reading Time: 2 minutesIf you like your operating system you can keep it.But if your OS is Windows XP you might want to...

Adobe Data Breach Gets Worse: Time to Change All Your Passwords?

Between Flash and PDF Reader alone, Adobe is ubiquitous on today’s desktop. Have you ever registered for an Adobe product? If you have,...

Data Encryption Needs to Be Part of Everyday Life

Reading Time: 2 minutesEmploying encryption strategies needs to be an everyday part of life due to the widespread use of mobile computing and...

Are Multi-Domain SSL Certificates Right for You?

Reading Time: 1 minuteNo web site that exchanges personal data with its site visitors can afford to operate without SSL. Without it, internet...

The Next Step in User Authentication: Pills and Tattoos?

Reading Time: 2 minutesHow does a system know you are really you?How to answer that question is becoming an increasingly urgent problem. Hacking is...

The Heartland Breach: A Cautionary Tale for E-Commerce

Reading Time: 4 minutesThe notorious John Dillinger was supposedly asked why he robbed banks.  His reply was “That’s where the money is!” You...

2 Billion Certificate Revocation Checks in a Day!

Reading Time: 2 minutesWow!On September 30th, Comodo’s (OCSP) responders handled over 2 billion requests in one day! Web users all over the globe...

Avoiding Malware in Android Apps

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app These are exciting times for Android smartphone users, with great...

Hand of the Thief Trojan: Can it Pick Your Pocket?

Reading Time: 2 minutesCriminals use the latest to technology for a very old-fashioned reason, to steal folk’s money. If they can obtain your...

Universities Go to School on Computer Security

Reading Time: 3 minutesCyber security at a university can be a very different challenge than in a corporate environment. With an ongoing wave...

Hackers Find Fatal Flaw of Fingerprint Security

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app When Apple announced the Touch ID technology that rolled out...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?