Generative Data Intelligence

Tag: windows

Block CryptoLocker Before It Installs with Comodo Endpoint Security

CryptoLocker, first spotted in September, continues to claim victims of both consumers and businesses alike. The Trojan is a form of ransomware that...

Adobe Fixes Flash Player and Cold Fusion Vulnerabilities

Reading Time: 2 minutes Adobe has successfully found and patched critical vulnerabilities found in their programs on Windows, Mac and Linux. The popular...

Microsoft Reports Threat to Older Office Versions and Windows Vista

Reading Time: 1 minuteOn Tuesday, Microsoft warned that hackers are targeting Windows Vista and MS Office versions 2003 to 2010 to exploit a...

Microsoft to Leave Windows XP Users Unprotected

Reading Time: 2 minutesIf you like your operating system you can keep it.But if your OS is Windows XP you might want to...

CryptoLocker Virus – Best Practices to Ensure 100% Immunity

Reading Time: 5 minutesYou may have heard of the latest virus, CryptoLocker, by now. The virus is a form of ransomware, a class...

How To Survive A Zombie Apocalypse On Your Computer

Reading Time: 4 minutesIn The Walking Dead, zombies suck brain matter in a frenzied hunger, completely unaware of what they’re doing – driven...

Dexter is a Killer: Virus Places Point of Sale Systems at Risk

Reading Time: 2 minutesI saw a recent headline “Dexter Strikes South Africa”.And I thought he was hiding out in Alaska! I was a big...

Google’s New Desktop Chrome Apps Follow in Comodo’s Footsteps

Reading Time: 3 minutesIt’s not only a matter of which came first: Google’s Chrome Apps experience or Comodo’s Virtual Kiosk; it’s also a...

Security is About More Than Firewalls

Reading Time: 3 minutesGuest blog post by SolarVPS A few weeks ago, our friends over at Comodo wrote an excellent blog for Solar VPS...

Curing What Ails the Cat: Apple Fixes for Mountain Lion & Safari

Reading Time: 2 minutesBesides using Comodo Internet Security, the best way to protect your computer is to keep up with all of the...

Hand of the Thief Trojan: Can it Pick Your Pocket?

Reading Time: 2 minutesCriminals use the latest to technology for a very old-fashioned reason, to steal folk’s money. If they can obtain your...

Google Says Goodbye to Netscape Plugin API!

Reading Time: 2 minutes Google has announced that Chrome will end support for the Netscape Plug-in API architecture, starting with ending support for most...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?