Generative Data Intelligence

Tag: web

Matousec’s Challenge

Reading Time: 2 minutes We have been very proud of the performance of Comodo Internet Security in the Matousec.com “Proactive Internet Security Challenge 64”...

An Intro to Spyware and Trojans

Reading Time: 2 minutesOnline shopping, online banking and general storage of personal information on personal computers have made consumers more vulnerable to identity...

Internet Explorer 10 Exploit Used to Target U.S. Military

Reading Time: 2 minutesThe US military may be trained to dodge bullets and bombs, but now they are being targeted with bits and...

Windows Systems: 6 Ways to Keep Your Network Secure

Reading Time: 2 minutesMicrosoft Windows is the dominant operating system in business organizations for desktops and intranet servers. It is also the number...

The Good, the Bad, and the Ugly about Crowd Translation

Crowd translation is an approach to translating texts that harnesses the speed of multiple individuals working on a text concurrently. There are many...

Phishing Scams: How Not to Be a Victim

Reading Time: 2 minutesMore and more unwitting email and Internet users are getting hooked by phishing scams, and it can be painful indeed. Phishing...

US-Cert: A Friend Against Cyber Attacks

Reading Time: 3 minutes“I’m from the government and I’m here to help”. You may know that this statement is often listed among...

Whitepaper: Identity and Trust Assurance Technologies

Reading Time: 2 minutesTrust is the currency of the internet.Without it, communication, commerce or collaboration cannot take place. How do we know? Because...

The Internet and Property Rights: Who is Looking Out for You?

Reading Time: 3 minutesAll Americans know that, according to our Declaration of Independence, we all have a right to “Life, Liberty and the...

Beware of Fake Filezilla!

Reading Time: 1 minuteOpen source software is great, especially the part about being able to use it without paying a license. The underlying...

Neiman Marcus Breach: Should Not Be Overshadowed By Target Breach

Reading Time: 2 minutes The recent data breach at the luxury specialty retailer Neiman Marcus has been overshadowed the mega data breach agt the...

Data Security: Protecting Your Most Precious Asset

Reading Time: 3 minutesIn the late 80’s and 90’s, most of the projects I was involved with were about converting paper based systems...

Latest Intelligence

Godaddy promo code

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?