Plato Data Intelligence.
Vertical Search & Ai.

Tag: computer security

Meltdown and Spectre Serious Vulnerabilities to Systems & Devices

Reading Time: 3 minutesUnless you’ve been living under a rock for the past few days, you’ll have heard that there are a...

There is no such thing as good malware | Comodo News

Reading Time: 4 minutesThere used to be a meme going around that stated “there are two types of companies in the world,...

Endpoint Security Glossary | Comodo Endpoint Protection

Reading Time: 9 minutesHere’s an A to Z glossary of terms related to Endpoint Protection-AAdvanced Persistent Threat (APT) – An unauthorized person...

Endpoint Security Glossary

Reading Time: 9 minutesHere’s an A to Z glossary of terms related to Endpoint Protection- A Advanced Persistent Threat (APT) – An unauthorized person gaining...

Professor Evans & his Essay On the Impossibility of Virus Detection

Reading Time: 3 minutesWhy Is Computer Security So Hard? On the Impossibility of Virus Detection Professor Dave Evans teaches Computer Science at the University of...

Fighting Spyware with a Firewall

Reading Time: 2 minutesIdentity theft is at a record high, and a significant number of identity theft cases are traced back to spyware....

Comodo Releases Internet Security 7: The Best Gets Better!

Reading Time: 2 minutesComodo Internet Security (CIS) is a robust suite of computer security systems, including a firewall and multiple layers of defense...

The Heartland Breach: A Cautionary Tale for E-Commerce

Reading Time: 4 minutesThe notorious John Dillinger was supposedly asked why he robbed banks.  His reply was “That’s where the money is!” You...

Universities Go to School on Computer Security

Reading Time: 3 minutesCyber security at a university can be a very different challenge than in a corporate environment. With an ongoing wave...

Cyber Crime and the Case for Auto Sandboxing

Reading Time: 2 minutesEvery computer, laptop, tablet and mobile phone connected to your network represents a vulnerable endpoint for viruses, worms, spyware, rootkits,...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?