Generative Data Intelligence

Tag: vulnerability

Advanced Persistent Threats: Everyone is at Risk

Reading Time: 3 minutesYou may think that cyber-attacks are someone else’s problem. You would be wrong. Cyber-attacks are growing in their number, sophistication and...

New Vulnerability Threatens IE Users, Comodo Provides a Solution

Reading Time: 4 minutesOn April 26th, Microsoft revealed that hackers are exploiting a critical vulnerability in their Internet Explorer browser to victimize users...

Virus Hall of Fame: SQL Slammer Virus

Reading Time: 3 minutesAny list of memorable computer viruses would have to include the SQL Slammer virus, unleashed in 2003. I certainly remember...

Case Study: Zamborg.com Needs Help Assuring E-Commerce

Reading Time: 4 minutes Business Challenge Many customers who are interested in buying a product off a new website feel unsure about the website’s authenticity....

Heartbleed Bug: Comodo Urges OpenSSL Users to Apply Patch

Reading Time: 3 minutesIn response to a reported vulnerability in the popular OpenSSL cryptographic library, Comodo is urging its customer, partners and all...

Adobe Patches Critical Flash Flaws

Reading Time: 1 minuteAdobe released a security update today that deals with several critical faults in Flash player and AIR on Windows, Mac...

Target Data Breach: PCI DSS Auditor in Lawyer’s Crosshairs

Reading Time: 2 minutesRetailers who accept credit cards must periodically demonstrate that they are in compliance the Payment Card Industry Data Security Standards...

Security Flaw Reported in Samsung Galaxy Androids

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Developers of Replicant, an open source variant of Android, claim...

Microsoft Releases Critical Security Updates for IE and Windows

Reading Time: 1 minuteA series of security updates release by Microsoft on March 11th included fixes for a critical security flaw in Internet...

Apple Leaves Snow Leopard in the Cold, Users Vulnerable

Reading Time: 2 minutes Unlike their desktop/laptop rival Microsoft, Apple does not go out of its way to alert their user base that...

HVAC Connection to Target Data Breach “Chilling”

Reading Time: 1 minuteCould a breach at a HVAC company specializing in supermarket refrigeration have led to the Target Data breach? Apparently so,...

Data Security: Protecting Your Most Precious Asset

Reading Time: 3 minutesIn the late 80’s and 90’s, most of the projects I was involved with were about converting paper based systems...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?