Generative Data Intelligence

Tag: Social networking

Data Security: Protecting Your Most Precious Asset

Reading Time: 3 minutesIn the late 80’s and 90’s, most of the projects I was involved with were about converting paper based systems...

Where Has Your Cursor Been? Facebook Wants to Know.

Reading Time: 2 minutesThe Facebook monitoring system and data analysis technologies have been become very controversial over privacy concerns. They are even being...

NSA Grade Surveillance Software Being Sold to Private Companies

Reading Time: 2 minutesThe controversy and privacy concerns over collecting big data still surrounds the national security agencies. While the NSA is a...

Watching the Watchers: 8 Tips to be Safe from Internet Snoopers

Reading Time: 3 minutesThe internet is a boon for billions of people around the globe that has led to better connectivity, communication, job...

Mobile Antivirus Adoption Is Low, But Not For Long

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app An alarming report by the Gartner Group claims that consumers...

Black Hat 2013: An Inside Look into Mobile Security

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app The Black Hat 2013 conference held at Las Vegas a...

Fixing the Problems #1 – CAA

Reading Time: 6 minutesFollowing the incident on March 15, Comodo introduced additional methods and controls immediately against this new threat vector.  On March...

Comodo SSL Affiliate The Recent RA Compromise

Reading Time: 3 minutesOn March 15th 2011, a Comodo affiliate RA was compromised resulting in the fraudulent issue of 9 SSL certificates to...

Malicious Threats Present A Growing Risk For Internet Users

Reading Time: 1 minuteThe amount of malware not detected by most PC Security software is increasing. This represents a heightened risk for Internet...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?