Generative Data Intelligence

Tag: mobile device

Verizon Mobile User Email Accounts Vulnerable

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app If you use Verizon Mobile, your email account may...

2014 In Review: Comodo Takes Lead in Threat Containerization!

Reading Time: 4 minutes2014 was a momentous year for Comodo, with a host of innovations and new product introductions. If we were to...

Comodo Mobile Device Management 3.0: Get Control of BYOD Today!

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app Does your head hurt at the mere mention of BYOD?...

Report: Mobile Devices can be Hijacked

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app Recently researchers from both the University of Michigan and the...

A Major League Data Breach: Houston Astros Strike Out!

Reading Time: 2 minutesIt’s been a rough few years for the Houston Astros baseball team on the field, in last place half way...

Google Shifts Focus of Android to the Enterprise

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Google has signaled a shift in focus for its Android...

AT&T Notifies Wireless Customers of Data Breach

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app The company whose logo used to be the cracked Liberty...

Comodo Enhances its Mobile Device Management Platform

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app We Bring Superior Mobile Device Management to Your Business Comodo Mobile...

Comodo Mobile Security for Android: Competitor Comparisons

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Mobile Devices, such as smartphones and tablets, are the hottest...

Mobile Device Management: Comodo Makes it About the Users

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app The age of BYOD, where users want to use their...

Comodo Mobile Masters Android Master Key Vulnerability

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app Have you ever heard of the old card trick, the...

Hand of the Thief Trojan: Can it Pick Your Pocket?

Reading Time: 2 minutesCriminals use the latest to technology for a very old-fashioned reason, to steal folk’s money. If they can obtain your...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?