Generative Data Intelligence

Tag: malware

Cyber Crime and the Case for Auto Sandboxing

Reading Time: 2 minutesEvery computer, laptop, tablet and mobile phone connected to your network represents a vulnerable endpoint for viruses, worms, spyware, rootkits,...

Comodo Introduces Industry Changing Endpoint Security Solution

Reading Time: 2 minutesComodo announced today their latest solution for centralized administration of security, including antivirus protection of endpoints. Comodo Endpoint Security Manager...

Comodo Internet Security 2013: A Hit with the Critics!

Reading Time: 2 minutesProducing a major software upgrade is a lot like producing a Broadway show. You write it, practice in the test...

Java Zero-Day Exploits: Why I am STILL Not Worried.

Reading Time: 3 minutesLast Saturday, I was surprised to see a news story that Homeland Security is recommending that all desktop users disable...

Malware using your computer to make digital money

Reading Time: 4 minutesElectronic money (e-money) is being used more and more often by people to make online purchases. And sure as night...

Password protected archives help malware evade detection

Reading Time: 4 minutesIf you need to deliver or store confidential documents over the Internet, then placing them inside a password-protected, self-extracting ‘archive’...

Anatomy of a Trojan: TrojWare.Win32.TrojanSpy.Volisk.a

Reading Time: 5 minutesAs part of Comodo Labs’ ongoing analysis of “Digital Signature” (confirming software author and guaranteeing computer program code hasn’t been...

Obama and Romney Finally Agreed on Something

Reading Time: 2 minutesNovember 6th is upon us, which in the United States means it is Election Day. And it isn’t just any...

If the White House Has Trouble With Hackers, Everyone is at Risk

Reading Time: 2 minutesAccording to the noted National Security expert Bill Gertz, White House computers have been compromised by hackers, probably from China,...

The Problem With Those Kate Middleton Topless Pictures

Reading Time: 2 minutesWe all do things spontaneously and impulsively on the web. We open an email from someone we don’t know, click...

Java Zero Day Exploit: Why I am not worried!

Reading Time: 2 minutesYou may have heard about a new Java Zero Day exploit that is causing a bit of a panic. Well,...

Antivirus Software – The Art of Denial

Reading Time: 4 minutesIt’s pretty clear to most people by now that Antivirus for pc just isn’t doing the job. Not only can you...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?