Reading Time: 2 minutesFollowing the Equifax data breach revelations, the Comodo Threat Intelligence Lab undertook a Dark Web analysis on the company and...
Reading Time: 2 minutesFollowing the Equifax data breach revelations, the Comodo Threat Intelligence Lab undertook a Dark Web analysis on the company...
Reading Time: 9 minutesHere’s an A to Z glossary of terms related to Endpoint Protection-
A
Advanced Persistent Threat (APT) – An unauthorized person gaining...
COMODO CERTIFICATE AUTHORITY BRAND ACQUIRED BY FRANCISCO PARTNERS
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate...
Reading Time: 3 minutesCyber criminals have resorted to another sophisticated way of infecting user systems with ransomware and other malware. Malvertising or compromised...
Reading Time: 3 minutesIoT: Unprecedented expansion
Internet of Things (IoT) is now part of our daily life. The internet has pervaded our day-to-day lives...
The NFC chip implanted in Meow-Ludo Meow Meow's thumb.
Image: Mashable
By Ariel Bogle2016-06-06 03:27:20 UTC
By October, Meow-Ludo Meow Meow hopes to...
Four key differences between blockchains and regular databasesIf you’ve been reading my previous posts, you will know by now that blockchains are simply...