MSP

Learn how MSPs Convert their Clients from Break/Fix to Managed Services

  The IT services industry continues to shift from the old, reactive break-fix model to the proactive Managed Services (MSP) approach, and for good reason: while small to medium-sized businesses might feel secure with their current break-fix “solution,” they may lack th...

Youtube Tips

7 Smart Tricks to Make the Most of YouTube

YouTube is the world’s second largest search engine for a good reaon. From viewing all the latest viral videos to finding workout tutorials, from streaming Ted Talks to catching a glimpse of upcoming movie trailers – YouTube really pulls it all on a platter for us! To...

Comodo Device Manager

Comodo News: Next Version of Comodo Device Manager Rolls Out, With New Antivirus Reporting and Configuration Features

Here at Comodo, we are excited to roll out the next version of our Comodo Device Manager (CDM version 4.5) with new and improved features including: An on-demand call-up history of all the executables that ran inside the sandbox/container The ability for IT administrators to...

Endpoint Security

Endpoint Security: Proactive Remote Computer Solutions Says We Trust Comodo

Companies large and small today face many of the same IT challenges – and one obstacle that all businesses are trying to hurdle is cybersecurity and protecting their endpoints from cyberattacks. Proactive Remote Computer Solutions (http://www.prcssupport.com) a managed servi...

Cyber Hacking Thumbs

From The Comodo Think Tank: Is the CPU computer from your own computer being used for evil?

That’s the question that Comodo Director of Technology Fatih Orhan put forth in a new byline article just posted in Computer Technology Review magazine. Is it possible that the CPU power from your own computer is being used for cyberattacks and the spread of malware? It inde...

CryptoWall vs Comodo Containment

CryptoWall vs Comodo Containment

CryptoWall, the ransomware Trojan, is spread by spam emails, malware already on your computer, or drive-by downloads. Here’s how it works: 1. CryptoWall installs itself on your computer. 2. CryptoWall phones home by contacting the server belonging to CyberCrooks. 3. The Cybe...

Cryptolocker

From The Comodo Think Tank: Cryptolocker, SpyEye and Shylock Malware are No Match for Comodo Containment Technology

Over the past few weeks, the engineers from the Comodo Think Tank have looked at some of the most feared malware and ransomware today, matching it up against Comodo’s containment technology. And the results? Cryptolocker fails against Comodo Containment. Shylock and SpyEye m...

Email Security

$46million Stolen in Cyberheist – don’t let this be your company

It has been reported that networking firm Ubiquiti Networks was the victim of cyber theft, where more than $46million was stolen – based on the spoofing of executive emails. KrebsOnSecurity does a great job of highlighting some of the recent cyberthefts via email spoofing in...

Alert: American Express Phishing Scam

Comodo has discovered a new phishing scam, this time targeting American Express Credit Card customers. The mail instructs victims to download an attachment and then to re-authenticate their account. When the user downloads the attachment and fills the form, it sends the vict...

comodo shield

Comodo Expands Market Share as Global Digital Certificate Authority

Comodo is happy to announce that, for the sixth consecutive month, our market share has grown as we’ve expanded even further our number one ranking in the SSL market. According to CEO Melih Abdulhayoğlu, “Comodo has earned each point of market share one by one. One user at a...

Page 1 of 4812345...102030...Last »