Generative Data Intelligence

Tag: surveillance

Why Do Enterprises Need Anti-spam Software?

Reading Time: 2 minutesSpamming is the act of sending unsolicited message via electronic messaging systems. Unsolicited or unwanted mails not only consume your...

Latest Wikileaks Document Dump: Comodo is a Pain for Hackers

Reading Time: 2 minutesThe latest news regarding Wikileaks documents from the CIA has caused quite an industry stir, and also caught Comodo’s attention...

It’s Now 1984 In Britain, Privacy No Longer Exists There

Britain just did the unthinkable, pushing the limits of government power under the guide of protection. The government approved the most extreme,...

What I Learned This Week – 11/18/16

Another week of vast information consumption, headlines, breach reports, security bulletins and client concerns. Learning everyday in the security consulting business...

Online Privacy and Security Concerns in an Age of Terror

Reading Time: 4 minutesOnce again, terror is in the news and dominates much of the national discussion. A major European city, the great...

Study: Americans Believe They Have Lost Control of Privacy

Reading Time: 2 minutes The Pew Research Institute released a study recently that shows that over 91% of Americans believe that consumers have lost...

Post Office Data Breach Raises Many Questions

Reading Time: 2 minutesThese are troubled times for the US Postal Service, due to the threat that email and electronic communication has posed...

Comodo Antivirus Conquers “Weapons Grade” Surveillance

Reading Time: 2 minutesWe are happy to report more independent evidence that you can sleep tight at night with Comodo Antivirus, even from...

Hacktivism a Growing Concern for IT

Reading Time: 3 minutesThe very existence of the United States as a nation can be traced back to a protest movement against taxes....

ZeuS Banking Trojan Surfaces Again, and Again

Reading Time: 3 minutesThe notorious ZeuS Banking Trojan seems to be immortal, like its Greek God namesake. In December it was reported that...

The Darkside of Internet Privacy: Tor and Chewbacca

Reading Time: 2 minutesIn recent years, a combination of Onion routing and the Tor network have allowed users stay hidden with great internet...

ZeuS Banking Trojan Is Back, Now in 64 Bit

Reading Time: 2 minutesIt’s often said “What’s old is new again”. The well-known ZeuS banking trojan is back again, but this time it...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?