Plato Data Intelligence.
Vertical Search & Ai.

Tag: Internet

Senate Report Exposes Dangers of Online Advertising and Malvertising

Reading Time: 2 minutesImproving privacy and security while browsing has been a major objective for Comodo in recent product releases and enhancements, and...

Still on XP? Here is Some Advice

Reading Time: 2 minutesWe would never advise using an unsupported operating system. Everytime Microsoft issues a security patch for its supported OSs, it...

Trusted Root Keys: Why they Matter

Reading Time: 2 minutesThe growing use of the Internet for commerce, communication and collaboration has significantly increased the need for online security. Certification...

OPSWAT: Comodo Security is a Leading Networking & Tech Solution

Reading Time: 2 minutes OPSWAT is an independent security firm that provides certifications for security applications to verify that they are compatible with leading...

Comodo AV Labs Warns of Free for Sale Scam

Reading Time: 5 minutesMost of the malware created these days is designed to generate income to the malware authors. That’s not a surprise,...

The History of the SSL Certificate

Reading Time: 3 minutesThe Secure Sockets Layer (SSL) Protocol was adopted by Netscape in 1994 as a response to the growing concern over...

New Vulnerability Threatens IE Users, Comodo Provides a Solution

Reading Time: 4 minutesOn April 26th, Microsoft revealed that hackers are exploiting a critical vulnerability in their Internet Explorer browser to victimize users...

Fighting Spyware with a Firewall

Reading Time: 2 minutesIdentity theft is at a record high, and a significant number of identity theft cases are traced back to spyware....

Comodo CEO Melih Abdulhayoglu Named Among Most Influential Turkish Americans

At Comodo, we were pleased and proud to learn that our CEO Melih Abdulhayoğlu has been named #6 on a list of “The...

Understanding Containment: Malware Defense for the Real World

Reading Time: 4 minutesIt is virtually impossible for the files of known viruses used by conventional scanners to be fully up to date....

How to Avoid Being Phished

Reading Time: 2 minutesPhishing is associated with fraudulent activities and stealing personal information on web. The sensitive information including passwords, ID and details...

Virus Hall of Fame: SQL Slammer Virus

Reading Time: 3 minutesAny list of memorable computer viruses would have to include the SQL Slammer virus, unleashed in 2003. I certainly remember...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?