Plato Data Intelligence.
Vertical Search & Ai.

Tag: Private Key

Smart contracts: The good, the bad and the lazy

Why private blockchains should not be eager to run codeI’m not a fan of the term “smart contracts”. For a start, it has been used...

Ending the bitcoin vs blockchain debate

Is there any value in a blockchain without a cryptocurrency? The debate has been running for a while but the past month has seen a...

Lenovo Users at Risk for Man-in-the-Middle Attacks from Superfish

Reading Time: 2 minutesLenovo has had some explaining to do this week. Lenovo has been shipping laptops and personal computers since 2010 with adware...

Code Signing Certificates: Do Not Develop Software Without Them

Reading Time: 3 minutesCode signing certificates from a trusted certificate provider allow developers to digitally sign their software so that customers know the...

Bitcoins: Hackers Target Virtual Currency

Reading Time: 3 minutesOpinions on Bitcoin, the electronic payment method vary widely. To some, it represents no less than the dawning of a...

SSL 101: How Do I Get a Secured Connection?

Reading Time: 3 minutesThe Secure Sockets Layer (SSL) allows you to communicate over the Internet with a secure and encrypted connection. SSL is...

CryptoLocker Virus – Best Practices to Ensure 100% Immunity

Reading Time: 5 minutesYou may have heard of the latest virus, CryptoLocker, by now. The virus is a form of ransomware, a class...

2 Billion Certificate Revocation Checks in a Day!

Reading Time: 2 minutesWow!On September 30th, Comodo’s (OCSP) responders handled over 2 billion requests in one day! Web users all over the globe...

BitCoin Transactions Vulnerable on Android

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app The use of BitCoin, digital currency that is not backed...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?