Generative Data Intelligence

Tag: security

How Enterprise IT Would Gain From Artificial Intelligence

Reading Time: 2 minutesArtificial Intelligence (A.I) is touching lives in the most intimate of manners and seems to be playing a vital role...

Stealing Data from Locked PCs Possible Using USB Device

Reading Time: 3 minutesThis should come as a surprise, a mild or perhaps not-so-mild shock, to those many people who lock their computer...

Ransomware That Strikes Posing As Windows Update

Reading Time: 2 minutesFantom, a new ransomware discovered recently, strikes disguised as a legitimate Microsoft Windows update. Thus it tricks users into downloading...

When DDoS Attacks, Botnets Play Mischief

Reading Time: 2 minutesDDoS attacks (Distributed Denial of Service attacks) and the data breaches that accompany such attacks are of serious consequence; these...

Project Sauron Malware has been Spying Government PC’s for Five Years

Reading Time: 2 minutesProject Sauron- that’s the name of the sinister malware that has been spying on government computers and computers at major...

Samsung Pay flaw that could be exploited by hackers

Reading Time: 3 minutesSamsung Pay reportedly has security flaws, as serious as POS security flaws, that could help hackers skim credit cards wirelessly...

Lack of Basic HTTPS Leads to Major Data Breach at Clash of Kings Forum

Reading Time: 2 minutesClash of Kings is a very popular mobile game with millions of avid players being members of its official forum....

File Converter Backdoor Mac Malware Infects Mac OS X

Reading Time: 2 minutesThe latest malware to hit Mac operating systems is the EasyDoc Converter. Cyber security experts have discovered this dangerous Mac...

Smart contracts and the DAO implosion

The tragic combination of inevitable bugs and immutable codeLast week witnessed a catastrophic event in the Ethereum ecosystem, when The DAO, a smart...

Michael C.Burgess Says Ransomware Criminals Should Be “Shot at Sunrise”

Reading Time: 3 minutesUS politician and Texas Representative Michael C.Burgess has voiced a very strong opinion regarding the issue of malware attacks when...

Four genuine blockchain use cases

Where shared ledgers add real value in enterprise IT Almost a year after first releasing MultiChain, we’ve learnt a huge amount about how blockchains, in...

Comodo Updates Free Managed Services Solution

Reading Time: 3 minutesToday, Comodo announced availability of its next version of its free Comodo IT management platform, Comodo One MSP version 3.1. Comodo...

Latest Intelligence

spot_img
spot_img
spot_img