Generative Data Intelligence

Tag: ICON

Comodo One. Understanding Procedures

Reading Time: 17 minutesComodo One. Understanding Procedures How to filter procedures Step 1: Go to ITSM > CONFIGURATION TEMPLATES > ‘Procedures’ and click Filter icon Step...

Comodo One. Takeover remote endpoints using ITSM

Reading Time: 6 minutesTakeover remote endpoints using ITSM ITSM’s ‘Takeover’ feature allows administrators to remotely access and control Windows devices to solve issues, install...

Comodo One. The Ins and Outs of Patch Management using Comodo ITSM

Reading Time: 15 minutesHow to check patch status and deploy selected patches to devices Step 1: Open ITSM and click ‘Devices’ > ‘Device List’....

How Crowdsourcing App Tilt Is Approaching International Expansion

Tilt (formerly known as Crowdtilt), is a crowdfunding app that makes it easy for groups and communities to collect money from people. Like...

Understanding the Android SMS Virus “Selfmite”

Reading Time: 3 minutesSelfmite is a Worm, a category of computer virus. A worm contains malicious code that uses system networks to replicate...

Customer Success Story: znappz Wins with Free SSL

Reading Time: 2 minutesWho are znappz? Znappz is a software developer in the UK and Norway that specializes in games and apps for mobile...

Comodo AV Labs Identifies Phishing Scam Targeting Gamers

Reading Time: 6 minutesContributors: Ionel Pomana, Kevin Judge Video games have played an important role in the history of computers and are a...

The History of the SSL Certificate

Reading Time: 3 minutesThe Secure Sockets Layer (SSL) Protocol was adopted by Netscape in 1994 as a response to the growing concern over...

New Vulnerability Threatens IE Users, Comodo Provides a Solution

Reading Time: 4 minutesOn April 26th, Microsoft revealed that hackers are exploiting a critical vulnerability in their Internet Explorer browser to victimize users...

Comodo AV Labs Identifies Dangerous Zeus Banking Trojan Variant

Reading Time: 4 minutesComodo Antivirus Labs has identified a new and extremely dangerous variant of the Zeus banking Trojan. Hackers use Zeus to...

Blink Before You Link!

“Don’t go upstairs! Don’t open the door! Don’t turn around!” These are the things I say to myself during a scary movie when...

Comodo SiteInspector: Free Malware Scan & Blacklist Monitor

Reading Time: 2 minutesAnother day, another innovative product from the security experts from Comodo. This time, it is free tool for protecting web...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?