Generative Data Intelligence

Tag: Vulnerable

PF Chang Data Breach: More Questions than Answers

Reading Time: 2 minutesThere are two disturbing bits of news this week regarding the recently revealed cardholder data breach at PF Chang, the...

Homeland Security: Symantec Web Gateway Vulnerable

Reading Time: 1 minuteAccording to Homeland Security’s Computer Emergency Response Team (US-CERT), the Symantec Web Gateway contains SQL injection and cross-site scripting vulnerabilities. Symantec...

OpenSSL Vulnerability Could be Exploited for Man-in-the-Middle Attacks

Reading Time: 1 minuteThere is more bad news this week for the popular OpenSSL implementation of the SSL and TLS protocols, which was...

Red Flag Rules on Identity Theft: Are You Compliant?

Reading Time: 3 minutesFlags that signal the risk of identity theft include suspicious activity indicating that identity thieves may be using stolen information....

Microsoft Internet Explorer 8 Vulnerability Requires Upgrade

Reading Time: 1 minuteMicrosoft Internet Explorer 8 contains a use-after-free vulnerability that can allow a remote, unauthenticated attacker to execute arbitrary code on...

Homeland Security Reports Hacked Infrastructure with Weak Security

Reading Time: 2 minutesAccording to a new report by the Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), public facing control...

Advanced Persistent Threats: Everyone is at Risk

Reading Time: 3 minutesYou may think that cyber-attacks are someone else’s problem. You would be wrong. Cyber-attacks are growing in their number, sophistication and...

New Vulnerability Threatens IE Users, Comodo Provides a Solution

Reading Time: 4 minutesOn April 26th, Microsoft revealed that hackers are exploiting a critical vulnerability in their Internet Explorer browser to victimize users...

Case Study: Zamborg.com Needs Help Assuring E-Commerce

Reading Time: 4 minutes Business Challenge Many customers who are interested in buying a product off a new website feel unsure about the website’s authenticity....

Hacktivism a Growing Concern for IT

Reading Time: 3 minutesThe very existence of the United States as a nation can be traced back to a protest movement against taxes....

Heartbleed Bug: Comodo Urges OpenSSL Users to Apply Patch

Reading Time: 3 minutesIn response to a reported vulnerability in the popular OpenSSL cryptographic library, Comodo is urging its customer, partners and all...

Comodo Mobile Security for Android: Competitor Comparisons

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Mobile Devices, such as smartphones and tablets, are the hottest...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?