Generative Data Intelligence

Tag: security researchers

Password managers are not invulnerable. But don’t tell anyone

Password managers are great. But they are not infallible. It turns out, doing the right thing is not always the best idea.What we mean...

Shodan: The IoT search engine (What is it?)

Shodan? What is it? How does it work? Do you need it? Is Shodan the Internet of Things search engine that everyone needs but...

Hack iMessage and WhatsApp and ‘earn’ $1 million.

Yes.There are now full-blown companies that sell and buy exploits.Some companies also deal in trading zero-day exploits.Now, these same companies are offering upwards...

Cold Boot | Newest Cold Boot Attack unlocks Mac, PC

Reading Time: 3 minutesKim CrawleyThe cybersecurity industry is all abuzz over a recently discovered and very scary exploit, a new devastating Cold...

How to Protect Yourself from Printer/Scanner Malware

Reading Time: 3 minutes In a rather new trend, cybercriminals have begun to spread malware by spoofing printers and scanners. These types of attacks started...

Ransomware Served Through Online Ads

Reading Time: 3 minutesCyber criminals have resorted to another sophisticated way of infecting user systems with ransomware and other malware. Malvertising or compromised...

Mobile Phones Under Attack by Ransomware

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Many people believe that mobile phones are immune from the...

HP Pwn2Own 2013: Mobile Bugs Earn Big Bucks!

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Mobile computing is on a spree and growing at a...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?