Tag: files
Breaking News
Anti-spam Software | Enterprise Email Security Solution From Comodo
Reading Time: 2 minutesSpamming is the act of sending unsolicited message via electronic messaging systems. Unsolicited or unwanted mails not only consume...
Cybersecurity Predictions for 2018 | Insights from Comodo Experts
Reading Time: 4 minutesCybersecurity in 2017 was a long, winding road with many surprising obstacles. Every other week, there seemed to be...
Ovum Research: Protecting Endpoints with Containment, Cloud Now “On the Radar” – Comodo News and Internet Security Information
Reading Time: 2 minutesA new research note profiling the unique auto-containment + Cloud analysis approach to endpoint protection in Advanced Endpoint Protection...
Marketing Can Influence Our Ability to Accept Sub-Optimal Situations
Reading Time: 3 minutesSometimes a marketing analogy misleads us about the complex idea it is trying to simplify. A great example of...
New October Ransomware Attack Hits Endpoints as “Unknown” File Phishes for Victims – Comodo News and Internet Security Information
Reading Time: 4 minutesComodo Threat Intelligence Lab discovered a new October phishing campaign with the infamous IKARUSdilapidated Locky ransomware payload, marking the...
Threat Lab Alert for October 27, 2017: Bad Rabbit is in Season – Comodo News and Internet Security Information
Reading Time: 2 minutesThreat Lab Alert for October 27, 2017: Bad Rabbit is in SeasonA new ransomware threat called “Bad Rabbit” (or...
Threat Lab Exclusive | Comodo Threat Intelligence Lab
Reading Time: 5 minutesUPDATE AND CORRECTION: Konica Minolta C224e is not sending you dangerous phishing emails. Malicious hackers have created an email and...
Now We Are All Just Numbers – Comodo News and Internet Security Information
Reading Time: 3 minutesWe are all just numbers now, but maybe there is a better way.Today all commerce is ecommerce. Your identity...
Understanding and Mitigating Bashware and Similar Malware Threats
Reading Time: 3 minutesEvery component of an operating system adds new functionality, and at the same time, creates potential openings for new...
How to Protect Your Company against Major Cyber Attack | Security Tips
Reading Time: 4 minutesIt seems like every week we hear about the biggest ever cyber-attack or hack. Today the news is full...
Comodo Remembers and Honors 9/11 Heroes
Reading Time: 3 minutesThe 9/11 attack had increased everyone’s consciousness on safety, sacrifices, and bravery. Thus, it made a great impact on...
IKARUSdilapidated Locky Part II | Comodo Threat Intelligence Lab
Reading Time: 4 minutesShould you fear your office scanner/printer? How about your post office?A second wave of new but related IKARUSdilapidated Locky...