Generative Data Intelligence

Tag: mobile phone

Report: Mobile Devices can be Hijacked

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app Recently researchers from both the University of Michigan and the...

AT&T Notifies Wireless Customers of Data Breach

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app The company whose logo used to be the cracked Liberty...

Supreme Court: Is Seizing a Mobile Phone is Like Seizing a Computer?

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app If a person is arrested for a routine traffic violation...

Understanding PGP in Mobile Phone Security

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app PGP stands for Pretty Good Privacy which is a software...

The Next Step in User Authentication: Pills and Tattoos?

Reading Time: 2 minutesHow does a system know you are really you?How to answer that question is becoming an increasingly urgent problem. Hacking is...

Mobile Antivirus and E-Authentication

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app With the surge in mobile phone market and the necessity...

Why is Mobile Security Integral In Modern Era?

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Times have changed and what used to be luxury is...

Cyber Crime and the Case for Auto Sandboxing

Reading Time: 2 minutesEvery computer, laptop, tablet and mobile phone connected to your network represents a vulnerable endpoint for viruses, worms, spyware, rootkits,...

Security Predictions For The Second Half of 2010

Reading Time: 1 minute2009 began with the biggest data breach in US history; the massive Hartland Payment System Credit Card Theft. This data...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?