Plato Data Intelligence.
Vertical Search & Ai.

Tag: browser

Are You Protected From Your Frenemies?

Reading Time: 4 minutesWe have the software to do a pretty good job of protecting ourselves from our digital enemies, the hackers who...

Adobe Breach Led Anonymous To Spy on FBI

Reading Time: 2 minutes It seems the government is great at collecting data but not very good at protecting it. The FBI recently reported that...

Watch Your Plugins: Silverlight at Risk

Reading Time: 1 minuteAs if we needed it, we have more proof that the black hats never rest. An already notorious exploit kit...

CryptoLocker Virus – Best Practices to Ensure 100% Immunity

Reading Time: 5 minutesYou may have heard of the latest virus, CryptoLocker, by now. The virus is a form of ransomware, a class...

Experts Speak Out Against Entering Private Data in Chrome

Reading Time: 2 minutesGoogle recently fixed a series of issues within the Chrome browser. At the same time, despite their strong attempts to...

Blink Before You Link!

“Don’t go upstairs! Don’t open the door! Don’t turn around!” These are the things I say to myself during a scary movie when...

2 Billion Certificate Revocation Checks in a Day!

Reading Time: 2 minutesWow!On September 30th, Comodo’s (OCSP) responders handled over 2 billion requests in one day! Web users all over the globe...

Case Study: Hayneedle Enjoys Meteoric Growth with Comodo EV SSL

Reading Time: 2 minutesOnline retailer, Hayneedle.com, has become an astonishing success with security-conscious shoppers since the brand was introduced in August, 2009. According...

Google’s New Desktop Chrome Apps Follow in Comodo’s Footsteps

Reading Time: 3 minutesIt’s not only a matter of which came first: Google’s Chrome Apps experience or Comodo’s Virtual Kiosk; it’s also a...

Google Says Goodbye to Netscape Plugin API!

Reading Time: 2 minutes Google has announced that Chrome will end support for the Netscape Plug-in API architecture, starting with ending support for most...

10 Tips for a Less Risky Internet Experience

Reading Time: 3 minutes The Internet can be a dangerous place to operate.  It is increasingly looking like a bad neighborhood when the police...

HP Pwn2Own 2013: Mobile Bugs Earn Big Bucks!

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Mobile computing is on a spree and growing at a...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?