Online Security

5 Points to Consider When Evaluating Next-Generation Endpoint Security Products

Endpoints are extremely vulnerable to security breaches. Hackers find endpoints to channel out infectious attacks through advanced persistent threats and ransomware. Threats are creatively mischevous to trick the user into clicking on any infectious link and route the user to…

malware incidents

Comodo publishes strategic analysis of 97M malware incidents in Q2

Comodo publishes strategic analysis of 97 million malware incidents in Q2 Comodo detected and analyzed nearly 100 million incidents in Q2 2017, almost quadruple the number from its Q1 report, in a detailed study released by Comodo Threat Research Labs…

endpoint security

Black Hat USA 2017: Learn and Relax

Starting July 22nd, Black Hat brings the cyber world together at Mandalay Bay for 6 days of learning. Though more “White Hat” than ever, Black Hat USA is still the premier opportunity to learn about both sides of an escalating IT…

Digital certificate

Meet with Comodo Experts Face-to-Face at the Black Hat Lobby Lounge, July 24-27

Got questions on cyber security, digital certificates, or Comodo solutions? Ask our experts face-to-face in the Comodo Lobby Lounge at Black Hat USA 2017. Our research scientists, sales team, engineering, threat intelligence, and SSL experts will be more than happy…

Petya Malware

Join Comodo Webinar to Protect Yourself from Next-Gen Ransomware

Petya, WannaCry, and More: How to Protect Yourself from the New Generation of Ransomware [Webinar] Register here: https://www.comodo.com/landing/comodo-conducts-webinar-on-protection-against-ransomware Ransomware has been in the headlines a lot lately, and for good reason. In the past two months, two separate ransomware attacks…

SSL Precertificates and How They Work

SSL Precertificates and How They Work

SSL certificates – yes, we have heard much about SSL certificates, but how about SSL Precertificates? – it doesn’t seem to ring a bell, does it? Now, this blog is an attempt to explore SSL Precertificates – what they are,…

Comodo Threat Research Labs

Comodo Q1 2017 Threat Report: Russia is World’s No. 1 Malware Target

Comodo Threat Research Labs (CTRL) detected more than 25 million malware incidents in 223 top-level country code domains (ccTLD), in nearly every nation, province, state and city on Earth in its new Q1 2017 Threat Report. Here, we summarize the…

Endpoint Security

Cyber-threat Alert: Summer 2017 Phishing Trip to Avoid

A Special Update from the Comodo Threat Intelligence Lab Phishing attacks using emails have become very common but the techniques are continually being enhanced and personalized to the point where we all need a refresher course. In the past, very…

Comodo Containment Technology

Tackling Cyber Security Threats in 2017

Businesses are on a helter-skelter as the current waves of cyber attacks make them double their efforts in protecting their operations as well as their customers. Their online reputation is at stake – along with their assets and the all-important…

There is no such thing as good malware

There is no such thing as good malware

There used to be a meme going around that stated “there are two types of companies in the world, those who know they have been hacked, and those that don’t know they have been hacked”. We all used to read…

Page 1 of 6112345...102030...Last »