Generative Data Intelligence

Tag: threats

AOL Ad Networks Distributing Malvertising

Reading Time: 2 minutesIt was first reported in early January that AOL ad distribution networks were serving malware infected ads on high profile...

Verizon Mobile User Email Accounts Vulnerable

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app If you use Verizon Mobile, your email account may...

Zero Day Vulnerability in Adobe Flash Player Threatens Web Users

Reading Time: 2 minutesCriminals are using a new zero day vulnerability in the Adobe Flash Player to conduct drive-by-downloads, infecting unsuspecting web site...

Sandboxing is Nice. Auto-Sandboxing is Essential

Reading Time: 2 minutesThe problem with conventional antivirus software is that they are like a bomb disposal unit that has not yet figured...

Beware of SONY Pirated Films!

Reading Time: 2 minutesEveryone loves to get something for free. Over the past few weeks thousands of people have not let a little...

Comodo Containerization in CIS 8 Proves the Future is Now!

Reading Time: 2 minutesSome people say that the future of Internet Security is Containerization. Comodo says the future is now! Comodo has announced the release...

AV-Test Labs: Comodo is Perfect Protection for Windows 8!

Reading Time: 1 minuteNobody is perfect, but in a critical aspect Comodo Internet Security is. Perfect protection against malware! In recent testing by the...

Tips for Secure Shopping on Black Friday and Cyber Monday

Reading Time: 3 minutesTis the season to be jolly, and to do a lot of holiday shopping! It’s an important time for both...

POS Under Attack: The Why, How & What to Do

Reading Time: 4 minutesOver the past year, there have been an alarming number of high profile data breaches of customer cardholder and personal...

Microsoft Plagued By Zero Day Vulnerabilities

Reading Time: 2 minutesThe opportunities for hackers and cybercriminals never seems to end. Microsoft issued a warning this week on an unpatched zero day...

Understanding the EV SSL Certificate Process

Reading Time: 3 minutesExtended Validation SSL Certificates are the most recent innovation in SSL Certificates. EV SSL certificates combat online threats that erode...

Homeland Security Warns Backoff POS Malware Speading Fast

Reading Time: 2 minutesIn July, Homeland Security warned of the Backoff POS malware threat, which has the ability to steal cardholder data and...

Latest Intelligence

spot_img
spot_img
spot_img