Tag: logging
Marriott Data Breach Affected 500 Million Guests at Starwood
Reading Time: 5 minutesData breaches are occurring with increasing frequency at name-brand companies, and it’s certainly cause for concern. Millions of customers...
Android Trojans | Fake Fortnite Game on Google Play Store
Reading Time: 4 minutesIf you’re into gaming, you’ve probably heard of Fortnite: Battle Royale. Epic Games’ popular new online title debuted on...
Anti-spam Software | Enterprise Email Security Solution From Comodo
Reading Time: 2 minutesSpamming is the act of sending unsolicited message via electronic messaging systems. Unsolicited or unwanted mails not only consume...
How to Protect Your Company against Major Cyber Attack | Security Tips
Reading Time: 4 minutesIt seems like every week we hear about the biggest ever cyber-attack or hack. Today the news is full...
Symantec to sell SSL certificate and PKI business to DigiCert
Reading Time: 3 minutesSymantec announced it is selling its website certification business to Digicert. Symantec customers and partners now may face potential...
Top 10 Effective Endpoint Security | Comodo Endpoint Protection
Reading Time: 4 minutesWith overwhelming cyber attacks happening through malicious apps on mobile devices, security geeks are to intensify the endpoint security...
Top 10 Features of an Effective Endpoint Security Strategy 2020
Reading Time: 4 minutesWith overwhelming cyber attacks happening through malicious apps on mobile devices, security geeks are to intensify the endpoint security...
Understanding Devices in ITSM Using Comodo One
Reading Time: 25 minutesComodo One. Understanding Devices in ITSMHow to implement “Bulk to installation package” in devices?Step 1: Click ‘Download Bulk Enrolment...
Ways to protect your identity from cybercriminals
Reading Time: 2 minutesYahoo has been hacked. LinkedIn has been hacked. Accounts have been stolen. Identities have been stolen.Identity theft is said...
New Phishing Attack Targeted ICICI Bank
Reading Time: 4 minutesThe Comodo Threat Research Labs (CTRL) team has identified a phishing attack that was targeted specifically at ICICI Bank...
Comodo Containment vs Zeus/MitB| Zeus Malware Threat
Reading Time: 4 minutesThe security engineers and IT experts from the Comodo Threat Research Labs are constantly analyzing the thousands of malware...
Comodo vs ZeroAccess | How do Rootkits work?
Reading Time: 3 minutesThe security engineers and IT experts from the Comodo Labs are constantly analyzing the thousands of malware families that...