Generative Data Intelligence

Tag: spread

Zero Day Vulnerability in Adobe Flash Player Threatens Web Users

Reading Time: 2 minutesCriminals are using a new zero day vulnerability in the Adobe Flash Player to conduct drive-by-downloads, infecting unsuspecting web site...

Sandboxing is Nice. Auto-Sandboxing is Essential

Reading Time: 2 minutesThe problem with conventional antivirus software is that they are like a bomb disposal unit that has not yet figured...

White House Under Cyber Attack!

Reading Time: 2 minutes The White House has had several breaches of its physical security recently that have caused embarrassment and concern for the...

ATMs Vulnerable to Malware Breaches

Reading Time: 3 minutesIt is a commonly held myth that ATM machines are not vulnerable to the type of malware infections that plague...

Understanding the Android SMS Virus “Selfmite”

Reading Time: 3 minutesSelfmite is a Worm, a category of computer virus. A worm contains malicious code that uses system networks to replicate...

Microsoft Plagued By Zero Day Vulnerabilities

Reading Time: 2 minutesThe opportunities for hackers and cybercriminals never seems to end. Microsoft issued a warning this week on an unpatched zero day...

Oracle Battles BASH Bug with Much Work Left to Do

Reading Time: 1 minuteOracle has released security updates to address BASH bug vulnerabilities found across multiple products. However, Oracle also included in its...

Comodo Antivirus Conquers “Weapons Grade” Surveillance

Reading Time: 2 minutesWe are happy to report more independent evidence that you can sleep tight at night with Comodo Antivirus, even from...

Mobile Phones Under Attack by Ransomware

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Many people believe that mobile phones are immune from the...

Adobe Patches Critical Flash Flaws

Reading Time: 1 minuteAdobe released a security update today that deals with several critical faults in Flash player and AIR on Windows, Mac...

Browser Hijacking: Don’t be a Victim

Reading Time: 2 minutesOne of the most annoying and often dangerous computer compromises is browser hijacking. You probably have experienced it. A program...

What Is Worm Autoit AARF?

Reading Time: 2 minutesWorm Autoit AARF comes from the family of Trojan infection which has a long history with the development of computer....

Latest Intelligence

spot_img
spot_img
spot_img