Generative Data Intelligence

Tag: phishing

Customer Data Breach: eBay Joins a Growing List of Hacked Companies

Reading Time: 2 minuteseBay Inc. issued a public statement today asking customers to change their web site passwords due to a breach of...

Boiler Spring Savings Protects Customers with Comodo

Reading Time: 3 minutesBoiling Springs Savings Bank: Financial Institution introduces SVT technology that authenticates web content to protect critical customer information in online...

Advanced Persistent Threats: Everyone is at Risk

Reading Time: 3 minutesYou may think that cyber-attacks are someone else’s problem. You would be wrong. Cyber-attacks are growing in their number, sophistication and...

You’ve Got Spam: AOL Data Breach Tied to Wave of Phishing

Reading Time: 2 minutes The company that made the phrase “You’ve got mail” famous is now saying that if “you’ve got AOL mail” you...

The History of the SSL Certificate

Reading Time: 3 minutesThe Secure Sockets Layer (SSL) Protocol was adopted by Netscape in 1994 as a response to the growing concern over...

How to Avoid Being Phished

Reading Time: 2 minutesPhishing is associated with fraudulent activities and stealing personal information on web. The sensitive information including passwords, ID and details...

Comodo AV Labs Identifies Dangerous Zeus Banking Trojan Variant

Reading Time: 4 minutesComodo Antivirus Labs has identified a new and extremely dangerous variant of the Zeus banking Trojan. Hackers use Zeus to...

Is that IRS Email Really from a Phisherman?

Reading Time: 2 minutesMillions of Americans are working hard these days to finalize their tax returns before the annual April 15th deadline. With...

Content Verification Certificates and Why You Need Them

Reading Time: 2 minutesContent Verification Certificates (CVC) facilitate the verification of “web page content”, the essential requirement for trusted e-commerce services that are...

Phishing Scams: How Not to Be a Victim

Reading Time: 2 minutesMore and more unwitting email and Internet users are getting hooked by phishing scams, and it can be painful indeed. Phishing...

HVAC Connection to Target Data Breach “Chilling”

Reading Time: 1 minuteCould a breach at a HVAC company specializing in supermarket refrigeration have led to the Target Data breach? Apparently so,...

Whitepaper: Identity and Trust Assurance Technologies

Reading Time: 2 minutesTrust is the currency of the internet.Without it, communication, commerce or collaboration cannot take place. How do we know? Because...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?