Generative Data Intelligence

Tag: Safari

Is the New Rwandan Cybercrime Law a Step Forward for Cybersecurity in Africa?

Reading Time: 5 minutesLike many countries around the world, cybercrime is a problem in Rwanda. Malware is a frequent means of...

New Rwandan Cybercrime Law | Step against cybecrimes in Africa

Reading Time: 5 minutesLike many countries around the world, cybercrime is a problem in Rwanda. Malware is a frequent means of conducting...

Password Stealer Hides In The Payment File And Hunts For Credentials

Reading Time: 3 minutesCybercriminals’ big hunt for users’ credentials is gaining momentum rapidly. Their strategy usually stays the same: get attention of the...

FREAK Attack Warning: Apple and Google Devices Most Vulnerable

Reading Time: 2 minutesAn SSL/TLS vulnerability has been identified that attackers could use to downgrade the cryptography of HTTPS connections to one vulnerable...

Apple Releases Critical Security Updates

Reading Time: 2 minutesApple has released security updates for OS X, Safari, iOS and Apple TV to address multiple vulnerabilities, one of which...

Apple Safari Security Updates Increasing in Frequency

Reading Time: 1 minuteApple has released a Safari security update to address vulnerabilities which could allow an attacker to execute arbitrary code or...

Apple Releases Critical Security Updates for OS X, Safari and Others

Reading Time: 1 minuteAs scheduled, Apple has released security updates this week for Mac OS X, Safari, iOS devices, and Apple TV to...

Apple Leaves Snow Leopard in the Cold, Users Vulnerable

Reading Time: 2 minutes Unlike their desktop/laptop rival Microsoft, Apple does not go out of its way to alert their user base that...

Curing What Ails the Cat: Apple Fixes for Mountain Lion & Safari

Reading Time: 2 minutesBesides using Comodo Internet Security, the best way to protect your computer is to keep up with all of the...

Anatomy of a Trojan: TrojWare.Win32.TrojanSpy.Volisk.a

Reading Time: 5 minutesAs part of Comodo Labs’ ongoing analysis of “Digital Signature” (confirming software author and guaranteeing computer program code hasn’t been...

February’s gone. But not forgotten.

Reading Time: 2 minutesIf you happen not to have been a frequent reader of the Blog contributions I’ve published within the Social Media...

Comodo Dragon: Outshines Chrome with AntiVirus Scan

Reading Time: 4 minutesAccording to Forrester, the world’s preeminent source of statistical data on the Internet, American adults now spend an average of...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?