Generative Data Intelligence

Tag: Internet

Google+ Hacked: Local Hotel Listings Hijacked

Reading Time: 2 minutes There are two things I‘ve learned for sure from studying internet security issues: Anyone can be hacked and hackers always...

RSA Conference 2014: Join us Feb 24-28 in San Francisco

Reading Time: 1 minute Comodo is excited to be attending the annual RSA Conference in San Francisco, Feb 24th through 28th, at the Masconi...

Hacker Spoils BBC Christmas

Reading Time: 2 minutes According to a Reuters report, an unidentified hacker seized control of one of the servers within the BBC network. The...

Comodo 2013: A Year of Achievements and Milestones

Reading Time: 3 minutesFew years in the history of Comodo have been eventful as 2013. We completed our move to new offices in...

Comodo Dragon is Armed Against Malvertising

Reading Time: 2 minutes Malvertising The first time I saw the term I thought it was a typo. In fact, it is a term that...

Happy Holidays From Comodo!

Reading Time: 1 minuteHere in America, on Christmas Eve, children eagerly await the arrival of Santa Claus. In fact, there are many who...

Comodo Announces Enhancements to Storage Solutions

Reading Time: 3 minutes Comodo  announced  today  that our range of backup and cloud storage solutions have undergone recent  enhancement.  The Comodo Cloud...

Target Data Breach: Should You Panic?

Reading Time: 2 minutes If you used a credit or debit card at a Target department store between November 27th and December 15th,...

Cheap SSL and High Quality: Not an Oxymoron at Comodo

Reading Time: 2 minutesWe have a running debate here at Comodo as to whether to use “Low Cost SSL” or “Cheap SSL” in...

The Darkside of Internet Privacy: Tor and Chewbacca

Reading Time: 2 minutesIn recent years, a combination of Onion routing and the Tor network have allowed users stay hidden with great internet...

Code Signing Certificates: Do Not Develop Software Without Them

Reading Time: 3 minutesCode signing certificates from a trusted certificate provider allow developers to digitally sign their software so that customers know the...

Browsing in the Sandbox: Its Time Has Come with Comodo

Reading Time: 2 minutesHardly a day goes by where we don’t learn about a new exploit to a major system that hackers use...

Latest Intelligence

spot_img
spot_img
spot_img