Generative Data Intelligence

Stay tuned

Subscribe to our latest newsletter and never miss the latest news!
Our newsletter is sent once a week, every Monday.

Latest news

Target Data Breach: The Losses Mount on Many Fronts

Reading Time: 2 minutesThe losses due the Target data breach are just beginning to be tabulated. According to financial results for the 4th...

Microsoft Offers Free XP Migration Tool as Support Deadline Looms

Reading Time: 2 minutesMicrosoft is treating Windows XP more as a computer bug to be eradicated than one its most successful products ever. Over...

Content Verification Certificates and Why You Need Them

Reading Time: 2 minutesContent Verification Certificates (CVC) facilitate the verification of “web page content”, the essential requirement for trusted e-commerce services that are...

Measuring the Social Media Popularity of Pages with DEA in JAVA

March 3, 2014 Vasilis Vryniotis . No comments In the previous article we have discussed about the Data...

Stay Away from the Man in the Middle

Reading Time: 3 minutesWhen you were a kid, presuming that you have indeed grown up, did you ever play the game “Man in...

Understanding PGP in Mobile Phone Security

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app PGP stands for Pretty Good Privacy which is a software...

Apple Leaves Snow Leopard in the Cold, Users Vulnerable

Reading Time: 2 minutes Unlike their desktop/laptop rival Microsoft, Apple does not go out of its way to alert their user base that...

What Is Worm Autoit AARF?

Reading Time: 2 minutesWorm Autoit AARF comes from the family of Trojan infection which has a long history with the development of computer....

How To Remove Win32 Vobfus Xc

Reading Time: 2 minutesDefinition of Win32 Vobfus xc Virus:Win32 Vobfus xc is a risky Trojan Virus which PC users should have removed from...

Has the Bitcoin Bubble Burst?

Reading Time: 2 minutesOwners of Bitcoins and fans of the virtual currency are reeling today on the news of the collapse of the...

Matousec’s Challenge

Reading Time: 2 minutes We have been very proud of the performance of Comodo Internet Security in the Matousec.com “Proactive Internet Security Challenge 64”...

An Intro to Spyware and Trojans

Reading Time: 2 minutesOnline shopping, online banking and general storage of personal information on personal computers have made consumers more vulnerable to identity...