Generative Data Intelligence

Tag: spread

From The Comodo Think Tank: Is the CPU computer from your own computer being used for evil?

Reading Time: 1 minuteThat’s the question that Comodo Director of Technology Fatih Orhan put forth in a new byline article just...

CryptoWall vs Comodo Containment

Reading Time: 1 minuteCryptoWall, the ransomware Trojan, is spread by spam emails, malware already on your computer, or drive-by downloads. Here’s how it works: 1....

Ending the bitcoin vs blockchain debate

Is there any value in a blockchain without a cryptocurrency? The debate has been running for a while but the past month has seen a...

A World That Speaks The Same Language

There are approximately 7.5 billion people on the third rock from the Sun. That’s 7,500,000,000 individual names, 15,000,000,000 ears, and 150,000,000,000 phalanges (give...

Free Amazon Gift Card? Just Say No!

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Android users throughout North American are being text message...

NSA Report: Defensive Best Practices for Destructive Malware

Reading Time: 2 minutesThe National Security Agency (NSA)’s Information Assurance Directorate has released a report on “Defensive Best Practices for Destructive Malware”. The...

Study: Most Used Antivirus Take up to 6 Months to Catch Threats

Reading Time: 3 minutesThe four most used antivirus have been put to the test and found wanting. We are not surprised. Comodo long ago...

“Free Porn” Costly to 100,000 Facebook Users

Reading Time: 1 minuteHackers know some people just can’t resist the allure of free porn, as 100,000 Facebook users learned the hard way....

Zero Day Vulnerability in Adobe Flash Player Threatens Web Users

Reading Time: 2 minutesCriminals are using a new zero day vulnerability in the Adobe Flash Player to conduct drive-by-downloads, infecting unsuspecting web site...

Sandboxing is Nice. Auto-Sandboxing is Essential

Reading Time: 2 minutesThe problem with conventional antivirus software is that they are like a bomb disposal unit that has not yet figured...

White House Under Cyber Attack!

Reading Time: 2 minutes The White House has had several breaches of its physical security recently that have caused embarrassment and concern for the...

ATMs Vulnerable to Malware Breaches

Reading Time: 3 minutesIt is a commonly held myth that ATM machines are not vulnerable to the type of malware infections that plague...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?