Plato Data Intelligence.
Vertical Search & Ai.

Tag: Internet

The Darkside of Internet Privacy: Tor and Chewbacca

Reading Time: 2 minutesIn recent years, a combination of Onion routing and the Tor network have allowed users stay hidden with great internet...

Code Signing Certificates: Do Not Develop Software Without Them

Reading Time: 3 minutesCode signing certificates from a trusted certificate provider allow developers to digitally sign their software so that customers know the...

Browsing in the Sandbox: Its Time Has Come with Comodo

Reading Time: 2 minutesHardly a day goes by where we don’t learn about a new exploit to a major system that hackers use...

Bitcoins: Hackers Target Virtual Currency

Reading Time: 3 minutesOpinions on Bitcoin, the electronic payment method vary widely. To some, it represents no less than the dawning of a...

Digital Email Certificates: Is Your Email Worth Protecting?

Reading Time: 2 minutesHow important is your email communication? Would it be a problem if someone intercepted it? What if someone modified it...

Kelhios: The Vampire of Botnets

Reading Time: 3 minutesA botnet, a network of unwillingly controlled computers, is sometimes called a Zombie network. That’s because, like “real zombies” the computer...

ZeuS Banking Trojan Is Back, Now in 64 Bit

Reading Time: 2 minutesIt’s often said “What’s old is new again”. The well-known ZeuS banking trojan is back again, but this time it...

Cyber Arms Race Heats Up

Reading Time: 2 minutesWhen we think of an “arms race” we usually think of advances in weaponry that cause death and destruction. It...

Managed DNS: Its Time Has Come

Reading Time: 3 minutesThe Domain Name System is fundamental to the functioning of the internet and works so well that we rarely consider how it...

AV-Test Labs Scores Comodo as Perfect Protection Once Again

Reading Time: 2 minutesComodo announced last week that our Comodo Internet Security Premium (CIS) software earned a 100% protection score in the most...

Where Has Your Cursor Been? Facebook Wants to Know.

Reading Time: 2 minutesThe Facebook monitoring system and data analysis technologies have been become very controversial over privacy concerns. They are even being...

SSL 101: How Do I Get a Secured Connection?

Reading Time: 3 minutesThe Secure Sockets Layer (SSL) allows you to communicate over the Internet with a secure and encrypted connection. SSL is...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?