Plato Data Intelligence.
Vertical Search & Ai.

Tag: phishing

Comodo Antivirus Conquers “Weapons Grade” Surveillance

Reading Time: 2 minutesWe are happy to report more independent evidence that you can sleep tight at night with Comodo Antivirus, even from...

1.2 Billion Reasons to Change Your Password

Reading Time: 3 minutesIf you are like me, you find it very annoying to be required to frequently change your password for your...

EndPoint Security Gets a Boost with Comodo SecureBox

Reading Time: 3 minutesComodo announced this week the latest addition to its portfolio of endpoint security products, Comodo SecureBox. SecureBox is a secure...

Microsoft Releases Emergency Security Update for Windows

Reading Time: 1 minuteMicrosoft has released a security advisory to address improperly issued SSL certificates that could be used in attempts to spoof...

Comodo ASG Introduces Control of Incoming Mail by MTA & Archiving

Reading Time: 3 minutesThe latest release of the Comodo Antispam Gateway (CASG) went live today with new features for controlling and archiving email....

Comodo AV Labs Identifies Phishing Scam Targeting Gamers

Reading Time: 6 minutesContributors: Ionel Pomana, Kevin Judge Video games have played an important role in the history of computers and are a...

Mobile Phones Under Attack by Ransomware

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Many people believe that mobile phones are immune from the...

Customer Data Breach: eBay Joins a Growing List of Hacked Companies

Reading Time: 2 minuteseBay Inc. issued a public statement today asking customers to change their web site passwords due to a breach of...

Boiler Spring Savings Protects Customers with Comodo

Reading Time: 3 minutesBoiling Springs Savings Bank: Financial Institution introduces SVT technology that authenticates web content to protect critical customer information in online...

Advanced Persistent Threats: Everyone is at Risk

Reading Time: 3 minutesYou may think that cyber-attacks are someone else’s problem. You would be wrong. Cyber-attacks are growing in their number, sophistication and...

You’ve Got Spam: AOL Data Breach Tied to Wave of Phishing

Reading Time: 2 minutes The company that made the phrase “You’ve got mail” famous is now saying that if “you’ve got AOL mail” you...

The History of the SSL Certificate

Reading Time: 3 minutesThe Secure Sockets Layer (SSL) Protocol was adopted by Netscape in 1994 as a response to the growing concern over...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?