Generative Data Intelligence

Tag: stolen

JPMorgan Chase Breach: Part of a Russian Cyberwar?

Reading Time: 2 minutesThe news last week that 76 million household customers and 7 million business customers of JPMorgan may have had their...

Jimmy John’s : Hacker’s take Bite out of Cardholder Data

Reading Time: 2 minutesJimmy John’s became the latest high profile retailer to report a possible breach of their point-of-sale system and a compromise...

Warning! RATS Attacking Mobile Devices

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app When it comes to securing a digital device, antivirus is...

Home Depot Data Breach Rocks Retail

Reading Time: 2 minutesWhen will the wave of POS data breaches that have been rocking American retail recently end? Not today, as retail...

Dairy Queen Data Breach: Backoff POS Malware Strikes Again

Reading Time: 2 minutesIt may be time to stop writing articles about point-of-sale data breaches and write about companies that have not had...

1.2 Billion Reasons to Change Your Password

Reading Time: 3 minutesIf you are like me, you find it very annoying to be required to frequently change your password for your...

P.F. Chang Data Breach: New Details Emerge

Reading Time: 2 minutesOn August 4th, P.F. Chang released a statement from CEO Rick Federico with new information about the data breach identified...

Alert! SpamTitan Users at Risk From Cross-site Scripting Vulnerability

Reading Time: 1 minuteAccording to Homeland Securities Computer Emergency Response Team (US-CERT) SpamTitan contains a reflected cross-site scripting (XSS) vulnerability. SpamTitan is a...

Comodo AV Labs Identifies Phishing Scam Targeting Gamers

Reading Time: 6 minutesContributors: Ionel Pomana, Kevin Judge Video games have played an important role in the history of computers and are a...

Homeland Security: Symantec Web Gateway Vulnerable

Reading Time: 1 minuteAccording to Homeland Security’s Computer Emergency Response Team (US-CERT), the Symantec Web Gateway contains SQL injection and cross-site scripting vulnerabilities. Symantec...

Red Flag Rules on Identity Theft: Are You Compliant?

Reading Time: 3 minutesFlags that signal the risk of identity theft include suspicious activity indicating that identity thieves may be using stolen information....

Customer Data Breach: eBay Joins a Growing List of Hacked Companies

Reading Time: 2 minuteseBay Inc. issued a public statement today asking customers to change their web site passwords due to a breach of...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?