I-Generative Data Intelligence

Tag: I-HTTPS

I-Apple Ikhipha Izibuyekezo Zokuphepha Ukuze Ibhekane Nezingozi Eziningi

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Apple released security updates for iOS devices, OS X Yosemite...

Ukuphulwa Kwedatha Yehhovisi Leposi Kuphakamisa Imibuzo Eminingi

Reading Time: 2 minutesThese are troubled times for the US Postal Service, due to the threat that email and electronic communication has posed...

I-Microsoft Patches 19 Year Old Bug

Reading Time: 2 minutesAmong its monthly bulletins announced this week, Microsoft announced a fix for vulnerability so old that if it was a...

Do You Need PCI Vulnerability Scanning?

Reading Time: 2 minutesWeb sites have never been more under attack by hackers and E-commerce sites are a prime target.  Right now,  do...

How to install and use the Datumbox Machine Learning Framework

November 9, 2014 Eleftherios Bampaletakis . 2 Comments In this guide we are going to discuss how to...

Milestone: Comodo AntiSpam Gateway Filters 100th Million Emails

Reading Time: 2 minutesComodo announced today announced that our Cloud-based AntiSpam Gateway (ASG) service filtered its 100 millionth email last month with over...

Trust Seals: E-Commerce Runs on Trust

Reading Time: 2 minutesMany e-Commerce sites display “Trust Seals”, aka Trust Mark Logos, provided by third parties who have conducted an independent audit...

POS Under Attack: The Why, How & What to Do

Reading Time: 4 minutesOver the past year, there have been an alarming number of high profile data breaches of customer cardholder and personal...

Homeland Security Warns Phishing Spreading Banking Malware

Reading Time: 2 minutesUS Homeland Security sent out an alert this week about an email phishing campaign that is distributing the “Drye” (or...

White House Under Cyber Attack!

Reading Time: 2 minutes The White House has had several breaches of its physical security recently that have caused embarrassment and concern for the...

TLS vs SSL: The Difference May Surprise You!

Reading Time: 3 minutesWhen you work with SSL (Secured Sockets Layer) to secure your web site or other types of communication, you may...

ATMs Vulnerable to Malware Breaches

Reading Time: 3 minutesIt is a commonly held myth that ATM machines are not vulnerable to the type of malware infections that plague...

Latest Intelligence

indawo_img
indawo_img
indawo_img