endpoint security

Black Hat USA 2017: Learn and Relax

Starting July 22nd, Black Hat brings the cyber world together at Mandalay Bay for 6 days of learning. Though more “White Hat” than ever, Black Hat USA is still the premier opportunity to learn about both sides of an escalating IT…

Digital certificate

Meet with Comodo Experts Face-to-Face at the Black Hat Lobby Lounge, July 24-27

Got questions on cyber security, digital certificates, or Comodo solutions? Ask our experts face-to-face in the Comodo Lobby Lounge at Black Hat USA 2017. Our research scientists, sales team, engineering, threat intelligence, and SSL experts will be more than happy…

Petya Malware

Join Comodo Webinar to Protect Yourself from Next-Gen Ransomware

Petya, WannaCry, and More: How to Protect Yourself from the New Generation of Ransomware [Webinar] Register here: https://www.comodo.com/landing/comodo-conducts-webinar-on-protection-against-ransomware Ransomware has been in the headlines a lot lately, and for good reason. In the past two months, two separate ransomware attacks…

SSL Precertificates and How They Work

SSL Precertificates and How They Work

SSL certificates – yes, we have heard much about SSL certificates, but how about SSL Precertificates? – it doesn’t seem to ring a bell, does it? Now, this blog is an attempt to explore SSL Precertificates – what they are,…

Comodo Threat Research Labs

Comodo Q1 2017 Threat Report: Russia is World’s No. 1 Malware Target

Comodo Threat Research Labs (CTRL) detected more than 25 million malware incidents in 223 top-level country code domains (ccTLD), in nearly every nation, province, state and city on Earth in its new Q1 2017 Threat Report. Here, we summarize the…

Endpoint Security

Cyber-threat Alert: Summer 2017 Phishing Trip to Avoid

A Special Update from the Comodo Threat Intelligence Lab Phishing attacks using emails have become very common but the techniques are continually being enhanced and personalized to the point where we all need a refresher course. In the past, very…

Comodo Containment Technology

Tackling Cyber Security Threats in 2017

Businesses are on a helter-skelter as the current waves of cyber attacks make them double their efforts in protecting their operations as well as their customers. Their online reputation is at stake – along with their assets and the all-important…

There is no such thing as good malware

There is no such thing as good malware

There used to be a meme going around that stated “there are two types of companies in the world, those who know they have been hacked, and those that don’t know they have been hacked”. We all used to read…

American independence day 2017

The 4th of July and the State of Online Security

The Fourth of July is an opportunistic time for shoppers to buy products that are currently in season with the best deals. Name any big product and you are surely to find a good sale offer for the 241st Independence…

Ransomware

Petya Ransomware | How It Spreads and How to Stay Ahead

After an examination of the encryption routine of the malware utilized as a part of the Petya/ExPetr assaults, experts understand that the malware author can’t decode the casualties’ circle – regardless of the possibility that an instalment was made. As…

Page 1 of 6012345...102030...Last »