Generative Data Intelligence

Tag: stolen

Why Are Ransomware Attacks Occurring with Increasing Frequency?

Reading Time: 3 minutesWe are starting to see it more and more: ransomware attacks are on the rise – and we’ve been seeing...

Blockchains vs centralized databases

Four key differences between blockchains and regular databasesIf you’ve been reading my previous posts, you will know by now that blockchains are simply...

FROM THE COMODO LABS: New Phishing Attack Targeted ICICI Bank(update: includes ICICI commentary)

Reading Time: 4 minutesThe Comodo Threat Research Labs (CTRL) team has identified a phishing attack that was targeted specifically at ICICI Bank and...

Safer Internet Day – What Can You Do To Keep Your Network Protected

Reading Time: 4 minutesToday, the second Tuesday of February, has been marked as “Safer Internet Day. For the past decade, it has served...

FROM THE COMODO LABS: Comodo Containment vs. Zeus/MitB

Reading Time: 4 minutesThe security engineers and IT experts from the Comodo Threat Research Labs are constantly analyzing the thousands of malware families...

FROM THE COMODO LABS: Alibaba.com the subject of new phishing attack

Reading Time: 3 minutesThe Comodo Antispam Labs (CASL) team has identified a new phishing attack targeted specifically at businesses and consumers who may...

$46million Stolen in Cyberheist – don’t let this be your company

Reading Time: 2 minutesIt has been reported that networking firm Ubiquiti Networks was the victim of cyber theft, where more than $46million was...

Alert: American Express Phishing Scam

Reading Time: 2 minutesComodo has discovered a new phishing scam, this time targeting American Express Credit Card customers. The mail instructs victims to...

BitDefender Hacked

Reading Time: 1 minuteBitDefender, the well-known IT security firm, fell victim to a data breach in which hackers stole critical customer data. A...

Stolen Bank Laptop Highlights Risks of Mobile Computing

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app On January 26th, a laptop was stolen from a...

2014 In Review: Comodo Takes Lead in Threat Containerization!

Reading Time: 4 minutes2014 was a momentous year for Comodo, with a host of innovations and new product introductions. If we were to...

Comodo Mobile Device Management 3.0: Get Control of BYOD Today!

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app Does your head hurt at the mere mention of BYOD?...

Latest Intelligence

spot_img
spot_img
spot_img