Plato Data Intelligence.
Vertical Search & Ai.

Tag: email

The Next Step in User Authentication: Pills and Tattoos?

Reading Time: 2 minutesHow does a system know you are really you?How to answer that question is becoming an increasingly urgent problem. Hacking is...

Experts Speak Out Against Entering Private Data in Chrome

Reading Time: 2 minutesGoogle recently fixed a series of issues within the Chrome browser. At the same time, despite their strong attempts to...

The Heartland Breach: A Cautionary Tale for E-Commerce

Reading Time: 4 minutesThe notorious John Dillinger was supposedly asked why he robbed banks.  His reply was “That’s where the money is!” You...

2 Billion Certificate Revocation Checks in a Day!

Reading Time: 2 minutesWow!On September 30th, Comodo’s (OCSP) responders handled over 2 billion requests in one day! Web users all over the globe...

Case Study: Hayneedle Enjoys Meteoric Growth with Comodo EV SSL

Reading Time: 2 minutesOnline retailer, Hayneedle.com, has become an astonishing success with security-conscious shoppers since the brand was introduced in August, 2009. According...

Google’s New Desktop Chrome Apps Follow in Comodo’s Footsteps

Reading Time: 3 minutesIt’s not only a matter of which came first: Google’s Chrome Apps experience or Comodo’s Virtual Kiosk; it’s also a...

Avoiding Malware in Android Apps

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app These are exciting times for Android smartphone users, with great...

Security is About More Than Firewalls

Reading Time: 3 minutesGuest blog post by SolarVPS A few weeks ago, our friends over at Comodo wrote an excellent blog for Solar VPS...

Comodo Mobile Masters Android Master Key Vulnerability

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app Have you ever heard of the old card trick, the...

Curing What Ails the Cat: Apple Fixes for Mountain Lion & Safari

Reading Time: 2 minutesBesides using Comodo Internet Security, the best way to protect your computer is to keep up with all of the...

Hand of the Thief Trojan: Can it Pick Your Pocket?

Reading Time: 2 minutesCriminals use the latest to technology for a very old-fashioned reason, to steal folk’s money. If they can obtain your...

How to Break Bad: Cyber Security Style

Reading Time: 4 minutes It happened yesterday. The day we’ve all been dreading since we first saw Walt in his tighty whities. Breaking Bad...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?