Plato Data Intelligence.
Vertical Search & Ai.

Tag: Ransom

New TeslaCrypt Ransomware is Extremely Dangerous – Unless You’re Protected by Comodo

Reading Time: 2 minutesThe model is familiar: Software developers work tirelessly to improve their product, releasing new versions to add new features or fix...

How to Decrypt and Remove TeslaCrypt Ransomware Files by Comodo

Reading Time: 2 minutesThe model is familiar:Software developers work tirelessly to improve their product, releasing new versions to add new features or...

FROM THE COMODO LABS: What’s old is new again, as that e-fax could contain CryptoLocker

Reading Time: 5 minutesSince 2013, the CryptoLocker malware has been making its way across the Internet in various forms, in various iterations. CryptoLocker...

e-Fax Could Contain Cryptolocker | Comodo Labs

Reading Time: 5 minutesSince 2013, the CryptoLocker malware has been making its way across the Internet in various forms, in various iterations....

The Ransomware Challenge: Back Up Your Clients’ Data Now!

Reading Time: 2 minutesNew, stronger forms of ransomware, such as Critoni and Cryptowall, are on the loose, reading hard and removable drives, then...

CryptoWall vs Comodo Containment

Reading Time: 1 minuteCryptoWall, the ransomware Trojan, is spread by spam emails, malware already on your computer, or drive-by downloads. Here’s how it works: 1....

From The Comodo Think Tank: Cryptolocker, SpyEye and Shylock Malware are No Match for Comodo Containment Technology

Reading Time: 3 minutesOver the past few weeks, the engineers from the Comodo Think Tank have looked at some of the most feared...

Mobile Phones Under Attack by Ransomware

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Many people believe that mobile phones are immune from the...

Cisco: Popular Sites Spreading Ransomware via Mavlertising

Reading Time: 2 minutesRansomware is quickly becoming the scourge of the Internet and Cisco Systems is reporting that several very popular web sites...

Comodo AV Labs Warns of Free for Sale Scam

Reading Time: 5 minutesMost of the malware created these days is designed to generate income to the malware authors. That’s not a surprise,...

CryptoLocker 2.0 – Are You Ready? We Are

Reading Time: 4 minutesWhile other security companies and their users are still struggling to deal with the infamous ransomware Cryptolocker, we have no...

Block CryptoLocker Before It Installs with Comodo Endpoint Security

CryptoLocker, first spotted in September, continues to claim victims of both consumers and businesses alike. The Trojan is a form of ransomware that...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?