Generative Data Intelligence

Tag: hacks

Comodo’s 2018 Cybersecurity Predictions: Smart Infrastructure Security, SSL Everywhere, The Rise of AI and More

Reading Time: 4 minutes Cybersecurity in 2017 was a long, winding road with many surprising obstacles. Every other week, there seemed to be a...

Cybersecurity Predictions for 2018 | Insights from Comodo Experts

Reading Time: 4 minutesCybersecurity in 2017 was a long, winding road with many surprising obstacles. Every other week, there seemed to be...

What’s Next for Melih Abdulhayoglu?

Reading Time: 3 minutes Melih took on the giants of the PKI certificate business and bested them, by creating the world’s leading certificate authority. Now...

Melih Abdulhayoglu | What is Next for Melih Towards Cybersecurity

Reading Time: 3 minutesMelih took on the giants of the PKI certificate business and bested them, by creating the world’s leading certificate...

How to Protect Your Company against Major Cyber Attack | Security Tips

Reading Time: 4 minutesIt seems like every week we hear about the biggest ever cyber-attack or hack. Today the news is full...

Major cyberattack affects 143 million users. Here’s how you can avoid this happening to your company

Reading Time: 4 minutesIt seems like every week we hear about the biggest ever cyber-attack or hack. Today the news is full of...

Why do Hackers Hack Websites? And How do You Protect Yourself From them?

Reading Time: 3 minutesThere are many reasons behind why hackers target websites. Years ago, hackers did it out sheer vanity. To prove that...

There is no such thing as good malware

Reading Time: 4 minutesThere used to be a meme going around that stated “there are two types of companies in the world, those...

Learn how Comodo mod_security rules will protect your web servers against attack. Free!

Reading Time: 6 minutes Contents: 1. Introduction2. Preparing the environment3. Attack analysis and prevention4. Conclusion 1) Introduction Web applications are arguably the most important element of today’s...

Cybercrime on a Colossal Scale

Reading Time: 3 minutesSurely there are very few in the US, or among Internet-connected citizens elsewhere, who are not aware of the massive...

How To Choose Best Endpoint Protection Software for Business

Reading Time: 2 minutesEndpoint security is of prime importance today; we see lots of endpoint devices getting connected to enterprise networks, thereby increasing...

Ransomware attacks are on the rise – Comodo can help protect you from them

Reading Time: 2 minutesFinancial services organization, banks, retail outlets and now hospitals and medical centers.  No industry seems to be safe from the...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?