Back to Results
First PageMeta Content
Computer crimes / Social engineering / Antivirus software / Spyware / Comodo Group / Malware / Phishing / Internet security / Hacker / Cryptography / Cyberwarfare / Computer security


Whitepaper September 9, 2014 Unsecure Endpoints Threaten Financial Transactions Secure Your Application
Add to Reading List

Open Document

File Size: 800,93 KB

Share Result on Facebook

City

Clifton / /

Company

Time Warner / Verizon / Merck / Comodo Group Inc. / Sears / Morgan Stanley / Comcast / /

Country

United States / /

/

IndustryTerm

food service / bank accounts / Internet security products / loggers using keyboard virtualization technology / healthcare organizations / mobile device management / application agnostic screen capturing detection technology / remote sharing tool / external applications / remote sharing tools / important applications / legitimate server / online banking site / keyboard virtualization technology / security products / screen capture software / remote control software / application-agnostic screen capture detection technology / light software / Internet connection / antivirus/antispyware software / Internet Explorer / remote desktop management tools / email systems / /

OperatingSystem

Microsoft Windows / /

Organization

White House / White House Military Office / Brute Force / /

/

Position

President / sales representative / keyboard filter driver / logger / /

Product

Comodo SecureBox / SQL Injection / /

ProgrammingLanguage

SQL / JavaScript / /

ProvinceOrState

New Jersey / /

Technology

application-agnostic screen capture detection technology / Using keyboard virtualization technology / firewall / loggers using keyboard virtualization technology / screen capture / ATM / antivirus software / mobile device / operating system / SSL / application agnostic screen capturing detection technology / /

URL

http /

SocialTag