Plato Data Intelligence.
Vertical Search & Ai.

Tag: usb

Project Sauron Malware has been Spying Government PC’s for Five Years – Comodo News and Internet Security Information

Reading Time: 2 minutesProject Sauron- that’s the name of the sinister malware that has been spying on government computers and computers at...

ATMs Vulnerable to Malware Breaches

Reading Time: 3 minutesIt is a commonly held myth that ATM machines are not vulnerable to the type of malware infections that plague...

Manually Removing an Autorun Virus

Reading Time: 3 minutesSo called “autorun viruses” were developed to infect external devices, such as infecting a victim’s PC while opening a flash...

Comodo Enhances its Mobile Device Management Platform

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app We Bring Superior Mobile Device Management to Your Business Comodo Mobile...

CryptoLocker 2.0 – Are You Ready? We Are

Reading Time: 4 minutesWhile other security companies and their users are still struggling to deal with the infamous ransomware Cryptolocker, we have no...

Kelhios: The Vampire of Botnets

Reading Time: 3 minutesA botnet, a network of unwillingly controlled computers, is sometimes called a Zombie network. That’s because, like “real zombies” the computer...

Adobe Data Breach Gets Worse: Time to Change All Your Passwords?

Between Flash and PDF Reader alone, Adobe is ubiquitous on today’s desktop. Have you ever registered for an Adobe product? If you have,...

HP Pwn2Own 2013: Mobile Bugs Earn Big Bucks!

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Mobile computing is on a spree and growing at a...

Super RATS? Comodo has Built a Better Mousetrap!

Reading Time: 2 minutesRAT is a common term in the malware community, which refers to the Remote Access Trojans. As the name suggests,...

5 Scary Things You Can Do To Your Computer on Friday the 13th

Reading Time: 4 minutes Today is Friday the 13th, one of the most unnerving days for superstitious people like myself. You may be picturing...

Black Hat 2013: An Inside Look into Mobile Security

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app The Black Hat 2013 conference held at Las Vegas a...

The Royal Birth: Beware of those Baby Pics!

Reading Time: 2 minutesPeople love baby pictures. Now that the Kate Middleton, aka the Duchess of Cambridge has given birth to a royal...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?