Plato Data Intelligence.
Vertical Search & Ai.

Tag: files

Anti-spam Software | Enterprise Email Security Solution From Comodo

Reading Time: 2 minutesSpamming is the act of sending unsolicited message via electronic messaging systems. Unsolicited or unwanted mails not only consume...

Cybersecurity Predictions for 2018 | Insights from Comodo Experts

Reading Time: 4 minutesCybersecurity in 2017 was a long, winding road with many surprising obstacles. Every other week, there seemed to be...

Ovum Research: Protecting Endpoints with Containment, Cloud Now “On the Radar” – Comodo News and Internet Security Information

Reading Time: 2 minutesA new research note profiling the unique auto-containment + Cloud analysis approach to endpoint protection in Advanced Endpoint Protection...

Marketing Can Influence Our Ability to Accept Sub-Optimal Situations

Reading Time: 3 minutesSometimes a marketing analogy misleads us about the complex idea it is trying to simplify. A great example of...

New October Ransomware Attack Hits Endpoints as “Unknown” File Phishes for Victims – Comodo News and Internet Security Information

Reading Time: 4 minutesComodo Threat Intelligence Lab discovered a new October phishing campaign with the infamous IKARUSdilapidated Locky ransomware payload, marking the...

Threat Lab Alert for October 27, 2017: Bad Rabbit is in Season – Comodo News and Internet Security Information

Reading Time: 2 minutesThreat Lab Alert for October 27, 2017: Bad Rabbit is in SeasonA new ransomware threat called “Bad Rabbit” (or...

Threat Lab Exclusive | Comodo Threat Intelligence Lab

Reading Time: 5 minutesUPDATE AND CORRECTION: Konica Minolta C224e is not sending you dangerous phishing emails. Malicious hackers have created an email and...

Now We Are All Just Numbers – Comodo News and Internet Security Information

Reading Time: 3 minutesWe are all just numbers now, but maybe there is a better way.Today all commerce is ecommerce. Your identity...

Understanding and Mitigating Bashware and Similar Malware Threats

Reading Time: 3 minutesEvery component of an operating system adds new functionality, and at the same time, creates potential openings for new...

How to Protect Your Company against Major Cyber Attack | Security Tips

Reading Time: 4 minutesIt seems like every week we hear about the biggest ever cyber-attack or hack. Today the news is full...

Comodo Remembers and Honors 9/11 Heroes

Reading Time: 3 minutesThe 9/11 attack had increased everyone’s consciousness on safety, sacrifices, and bravery. Thus, it made a great impact on...

IKARUSdilapidated Locky Part II | Comodo Threat Intelligence Lab

Reading Time: 4 minutesShould you fear your office scanner/printer? How about your post office?A second wave of new but related IKARUSdilapidated Locky...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?