Information Security & Risk Management Summit 2018

What We Learned at Gartner Information Security & Risk Management Summit 2018 in Maryland

The Gartner Information Security & Risk Management Summit at National Harbor, Maryland ran from June 3rd to 7th. Gartner’s event is a great opportunity for…

cybercriminals

Is the New Rwandan Cybercrime Law a Step Forward for Cybersecurity in Africa?

Like many countries around the world, cybercrime is a problem in Rwanda. Malware is a frequent means of conducting cybercrime. According to Comodo intelligence, between…

AV-TEST award Comodo Internet Security Premium ‘Top Product’ for the second time this year

Comodo Internet Security Premium was again placed among the best security anti-malware solutions in AV-TEST report of April 2018. Comodo is the only free-for-life product…

ransomware

From Russia with Subpoena: New Variant of Sigma Ransomware to Scare Users

Would you be scared or at least anxious if you’d found a subpoena to the US district court in your email box? Most of the…

Comodo Dome Shield

Comodo Dome Shield 1.16 | Best Defense from Web-borne Threats

Announcing Comodo Dome Shield 1.16 It’s been around a year since we first launched Comodo Dome Shield, the FREE of charge DNS-based security service. Dome…

Patch Management

Ticketfly Data Breach Means Music Fans Need to Go Elsewhere for Tickets

Summer has yet to officially start, but to me it feels like it’s begun already. My hometown of Toronto has been experiencing sweltering temperatures for…

Happy Donut Day!

It’s June 1st, so have a happy Donut Day! Your IT staff works hard all year. Perhaps you should consider bringing in a box of…

malware attacks

Tension Between Donald Trump and North Korea Coincides with Malware Spikes

Talks of Korean reunification have made me feel very optimistic. The Korean War has had a devastating effect on Koreans on both sides of the…

Phishing Email

Phishing Trap for Microsoft Users | Phishing Attacks – Comodo

Phishing trap for One Drive users. How to avoid falling prey? Cybercriminals often use very cunning and inventive tricks to manipulate victim’s mind in phishing…

Chrome Extentsion

Facebook Distributed Trojan Targets Cryptocurrency

Do you use Facebook Messenger? Do you use Chrome on your desktop? Do you also use Bitcoin and have a wallet? Would you install something…

Page 1 of 7012345...102030...Last »