Plato Data Intelligence.
Vertical Search & Ai.

Tag: mobile phone

Whatsup Subject of New Malware Attack | Comodo Antivirus

Reading Time: 3 minutesThe Comodo Antispam Labs (CASL) team has identified a new malware attack targeted specifically at businesses and consumers who...

Comodo News: Next Version of Comodo Device Manager Rolls Out, With New Antivirus Reporting and Configuration Features

Reading Time: 1 minuteHere at Comodo, we are excited to roll out the next version of our Comodo Device Manager (CDM version 4.5)...

ATMs Vulnerable to Malware Breaches

Reading Time: 3 minutesIt is a commonly held myth that ATM machines are not vulnerable to the type of malware infections that plague...

Report: Mobile Devices can be Hijacked

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app Recently researchers from both the University of Michigan and the...

AT&T Notifies Wireless Customers of Data Breach

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app The company whose logo used to be the cracked Liberty...

Supreme Court: Is Seizing a Mobile Phone is Like Seizing a Computer?

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app If a person is arrested for a routine traffic violation...

Understanding PGP in Mobile Phone Security

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app PGP stands for Pretty Good Privacy which is a software...

The Next Step in User Authentication: Pills and Tattoos?

Reading Time: 2 minutesHow does a system know you are really you?How to answer that question is becoming an increasingly urgent problem. Hacking is...

Mobile Antivirus and E-Authentication

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app With the surge in mobile phone market and the necessity...

Why is Mobile Security Integral In Modern Era?

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Times have changed and what used to be luxury is...

Cyber Crime and the Case for Auto Sandboxing

Reading Time: 2 minutesEvery computer, laptop, tablet and mobile phone connected to your network represents a vulnerable endpoint for viruses, worms, spyware, rootkits,...

Security Predictions For The Second Half of 2010

Reading Time: 1 minute2009 began with the biggest data breach in US history; the massive Hartland Payment System Credit Card Theft. This data...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?