Generative Data Intelligence

Tag: Reading

Cold Boot | Newest Cold Boot Attack unlocks Mac, PC

Reading Time: 3 minutesKim CrawleyThe cybersecurity industry is all abuzz over a recently discovered and very scary exploit, a new devastating Cold...

Mirai strikes | Mirai searched the internet for IoT devices

Reading Time: 4 minutesAll it took was one malware to form a botnet that left the domain-based internet inaccessible to many on...

Ryuk | New Ransomware Targeting Businesses and Enterprises

Reading Time: 3 minutesLook out, SamSam. There’s a new ransomware in town that’s very carefully targeting enteprises and businesses. Say hello to...

Anti-spam Filtering Techniques | How To Prevent Spam Emails

Reading Time: 3 minutesAntispam solutions can be of great use if you or your business is experiencing huge volumes of spam emails....

Unbabel at Dreamforce 2018: Not all heroes wear capes. But we do

There is a superhero in all of us, we just need the courage to put on the cape.…said Superman and I tend to...

GandCrab Ransomware and its evolution | How this Infects PC?

Reading Time: 5 minutesThe arms race between cybercriminals and cybersecurity warriors is increasing at an enormous speed. Malware authors immediately react on...

Spam Email Filtering Service | Comodo Dome Anti-spam For Business

Reading Time: 3 minutesThe Best Spam Filtering ServiceNaturally, website owners and system administrators ponder on many factors that make a spam filter...

What Is Internet Security? | Free Internet Security Suite For PC

Reading Time: 5 minutesInternet security is a branch of computer security which comprises various security measures exercised for ensuring the security of...

Ransomware Attacks Crippled Indian Hospitals | Comodo Cybersecurity

Reading Time: 3 minutesRansomware is pretty dreadful when it hits consumer PCs and smartphones. But ransomware is also frequently being used to...

How Unwanted Applications Are A Greater Security Threat

Reading Time: 4 minutesMany people don’t take Potentially Unwanted Applications (PUA) as a serious danger. The reason for such a reckless attitude...

Android Trojans | Fake Fortnite Game on Google Play Store

Reading Time: 4 minutesIf you’re into gaming, you’ve probably heard of Fortnite: Battle Royale. Epic Games’ popular new online title debuted on...

Here’s What I Learned From the Latest Comodo Cybersecurity Global Threat Report

Reading Time: 3 minutesThe second quarter 2018 Comodo Cybersecurity Global Threat Report has just been released! I couldn’t wait to read it, and...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?