Generative Data Intelligence

Tag: security

Apple Releases Security Updates to Address Many Vulnerabilities

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Apple released security updates for iOS devices, OS X Yosemite...

Post Office Data Breach Raises Many Questions

Reading Time: 2 minutesThese are troubled times for the US Postal Service, due to the threat that email and electronic communication has posed...

Microsoft Patches 19 Year Old Bug

Reading Time: 2 minutesAmong its monthly bulletins announced this week, Microsoft announced a fix for vulnerability so old that if it was a...

Do You Need PCI Vulnerability Scanning?

Reading Time: 2 minutesWeb sites have never been more under attack by hackers and E-commerce sites are a prime target.  Right now,  do...

Milestone: Comodo AntiSpam Gateway Filters 100th Million Emails

Reading Time: 2 minutesComodo announced today announced that our Cloud-based AntiSpam Gateway (ASG) service filtered its 100 millionth email last month with over...

Trust Seals: E-Commerce Runs on Trust

Reading Time: 2 minutesMany e-Commerce sites display “Trust Seals”, aka Trust Mark Logos, provided by third parties who have conducted an independent audit...

POS Under Attack: The Why, How & What to Do

Reading Time: 4 minutesOver the past year, there have been an alarming number of high profile data breaches of customer cardholder and personal...

Homeland Security Warns Phishing Spreading Banking Malware

Reading Time: 2 minutesUS Homeland Security sent out an alert this week about an email phishing campaign that is distributing the “Drye” (or...

White House Under Cyber Attack!

Reading Time: 2 minutes The White House has had several breaches of its physical security recently that have caused embarrassment and concern for the...

TLS vs SSL: The Difference May Surprise You!

Reading Time: 3 minutesWhen you work with SSL (Secured Sockets Layer) to secure your web site or other types of communication, you may...

ATMs Vulnerable to Malware Breaches

Reading Time: 3 minutesIt is a commonly held myth that ATM machines are not vulnerable to the type of malware infections that plague...

Computing Security Mag Honors Comodo Endpoint Security

Reading Time: 2 minutesOn October 9th, Computing Security Magazine named Comodo Endpoint Security Manager (CESM) the “Anti Malware Solution Of the Year for...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?