Generative Data Intelligence

Tag: hacking

SECURITY IN THE TIMES OF IoT

Reading Time: 3 minutesIoT: Unprecedented expansion Internet of Things (IoT) is now part of our daily life. The internet has pervaded our day-to-day lives...

One man’s quest to pay for lunch with a chip implanted in his thumb

The NFC chip implanted in Meow-Ludo Meow Meow's thumb. Image: Mashable By Ariel Bogle2016-06-06 03:27:20 UTC By October, Meow-Ludo Meow Meow hopes to...

From The Comodo Think Tank: Is the CPU computer from your own computer being used for evil?

Reading Time: 1 minuteThat’s the question that Comodo Director of Technology Fatih Orhan put forth in a new byline article just...

cWatch Delivers Umatched Awareness of Zero-day Threats & Malware

Reading Time: 3 minutes What’s worse, having your network compromised by a hacker or having your network compromised by a hacker and not knowing...

JPMorgan Chase Breach: Part of a Russian Cyberwar?

Reading Time: 2 minutesThe news last week that 76 million household customers and 7 million business customers of JPMorgan may have had their...

E-Commerce in the Crosshairs: How to Keep Your Site Secure

Reading Time: 6 minutes If you have an e-Commerce site you are in crosshairs of hackers. Why? Because you are the goose with the...

Hackers, the Dark Side of the Tech Revolution

Reading Time: 3 minutesWhen I read about hackers and cyber criminals I often think of the old TV show Get Smart. After vanquishing...

Homeland Security Reports Hacked Infrastructure with Weak Security

Reading Time: 2 minutesAccording to a new report by the Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), public facing control...

Cyberwar: US to Battle Chinese Military in Court

Reading Time: 2 minutesThe so called cyberwar between the US and China is about to take an interesting turn that could have significant...

Advanced Persistent Threats: Everyone is at Risk

Reading Time: 3 minutesYou may think that cyber-attacks are someone else’s problem. You would be wrong. Cyber-attacks are growing in their number, sophistication and...

Adobe Patches Critical Flash Flaws

Reading Time: 1 minuteAdobe released a security update today that deals with several critical faults in Flash player and AIR on Windows, Mac...

Comodo Mobile Security for Android: Competitor Comparisons

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Mobile Devices, such as smartphones and tablets, are the hottest...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?