Generative Data Intelligence

Tag: theft

Target Data Breach: The Losses Mount on Many Fronts

Reading Time: 2 minutesThe losses due the Target data breach are just beginning to be tabulated. According to financial results for the 4th...

Content Verification Certificates and Why You Need Them

Reading Time: 2 minutesContent Verification Certificates (CVC) facilitate the verification of “web page content”, the essential requirement for trusted e-commerce services that are...

Has the Bitcoin Bubble Burst?

Reading Time: 2 minutesOwners of Bitcoins and fans of the virtual currency are reeling today on the news of the collapse of the...

An Intro to Spyware and Trojans

Reading Time: 2 minutesOnline shopping, online banking and general storage of personal information on personal computers have made consumers more vulnerable to identity...

ZeuS Banking Trojan Surfaces Again, and Again

Reading Time: 3 minutesThe notorious ZeuS Banking Trojan seems to be immortal, like its Greek God namesake. In December it was reported that...

The Internet and Property Rights: Who is Looking Out for You?

Reading Time: 3 minutesAll Americans know that, according to our Declaration of Independence, we all have a right to “Life, Liberty and the...

PCI DATA SECURITY STANDARDS: BEYOND COMPLIANCE

Reading Time: 2 minutesThere is an epidemic of identity theft that is costing businesses and consumers millions of dollars per year. Most of...

Why are Medical Records Becoming a Target for ID Thieves?

Reading Time: 2 minutesIf you have no idea about medical identity theft, you would probably say that there’s nothing wrong in taking your...

Adobe Fixes Flash Player and Cold Fusion Vulnerabilities

Reading Time: 2 minutes Adobe has successfully found and patched critical vulnerabilities found in their programs on Windows, Mac and Linux. The popular...

Hand of the Thief Trojan: Can it Pick Your Pocket?

Reading Time: 2 minutesCriminals use the latest to technology for a very old-fashioned reason, to steal folk’s money. If they can obtain your...

BitCoin Transactions Vulnerable on Android

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app The use of BitCoin, digital currency that is not backed...

PCI DSS Compliance: Failure is Not an Option

Reading Time: 3 minutesThere is an epidemic of identity theft and financial fraud hat is costing businesses and consumers millions of dollars per...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?