Tag: Identity
Ukusakaza Izindaba
Why do Hackers Hack Websites? And How do You Protect Yourself From them?
Reading Time: 3 minutesThere are many reasons behind why hackers target websites. Years ago, hackers did it out sheer vanity. To prove that...
Blockchain Technology | Amit Modi
Blockchain is an emerging way for businesses, industries, and public organisations to almost instantaneously make and verify transactions—streamlining business processes, saving money, and...
Microsoft and Accenture Dublin Blockchain team prototype Identity Scheme
As reported in EthNews, the Accenture Blockchain Lab in Dublin has partnered with Microsoft to build a prototype blockchain based identify scheme under...
Izici Ezinhle Ezingu-10 Zesu Lokuphepha Lephoyinti Lokugcina Eliphumelelayo
Reading Time: 4 minutesWith overwhelming cyber attacks happening through malicious apps on mobile devices, security geeks are to intensify the endpoint security measures...
Izici Eziphezulu Eziyi-10 Zesu Lokuphepha Lephoyinti Eliphumelelayo lango-2020
Reading Time: 4 minutesWith overwhelming cyber attacks happening through malicious apps on mobile devices, security geeks are to intensify the endpoint security...
Qaphela Umkhonyovu Wekhadi Lesikweletu Lehhotela
Ngolunye usuku futhi omunye umkhonyovu uyazungeza. Kulokhu iqondiswe kubaxhasi bamahhotela. Njengawo wonke umkhonyovu lo...
SSL/PKI/X.509—Automated Digital Certificate Lifecycle Management Reduces Risk and Costs
Reading Time: 3 minutesWhile SSL/TLS certificates provide the backbone for information security—digital certificate management is going to get harder as enterprises turn to...
Comodo One. Understanding Service Desk
Reading Time: 40 minutesComodo One. Understanding Service Desk
How to add a user in staff panel?
The “User Directory” under the “Users” tab lists all...
Comodo Detects New Family of Sophisticated Financial Malware
Reading Time: 3 minutesComodo Threat Research Labs (CTRL) has announced that it has detected a new family of financial malware dubbed as “Gugi/Fanta/Lime”....
Protect Yourself Against Identity Theft
Reading Time: 2 minutesYahoo has been hacked. LinkedIn has been hacked. Accounts have been stolen. Identities have been stolen.
Identity theft is said to...
Izinkontileka ezihlakaniphile kanye nokufakwa kwe-DAO
The tragic combination of inevitable bugs and immutable codeLast week witnessed a catastrophic event in the Ethereum ecosystem, when The DAO, a smart...
Four genuine blockchain use cases
Where shared ledgers add real value in enterprise IT
Almost a year after first releasing MultiChain, we’ve learnt a huge amount about how blockchains, in...