web security

Cybercrime on a Colossal Scale

Surely there are very few in the US, or among Internet-connected citizens elsewhere, who are not aware of the massive security breach suffered by Yahoo…

Monitors in ITSM

Comodo One. Understanding monitors in ITSM

Comodo One. Understanding monitors in ITSM What is ‘Monitoring’ in ITSM profiles How to configure ‘Monitors’ in profiles How to check monitoring logs How to…

Comodo One

Comodo One. Understanding Procedures

Comodo One. Understanding Procedures How to filter procedures How to create and run script procedure in devices How to schedule the procedure using profiles How…

Endpoint Protection

How To Choose Best Endpoint Protection Software for Business

Endpoint security is of prime importance today; we see lots of endpoint devices getting connected to enterprise networks, thereby increasing the chances of hacks and…

web security

Mozilla, Tor Release Patches to Block Active Zero Day Exploits

Mozilla and Tor recently released patches for the Firefox browser as well as the Firefox-based Tor browser aiming to block a recent attack. This attack…

Alerts in ITSM

Comodo One. Configuring alerts in ITSM

Comodo One. Configuring alerts in ITSM How to configure alerts How to create an automated alert ticket in Service desk using ‘Monitoring’ How to configure…

Android security

Comodo Threat Research Labs Warns Android Users of “Tordow v2.0” outbreak

In late November 2016, Comodo Threat Research Labs discovered samples of the Android malware “Tordow v2.0” affecting clients in Russia. Tordow is the first mobile…

Remote Endpoints

Comodo One. Takeover remote endpoints using ITSM

Takeover remote endpoints using ITSM How to prevent users from establishing the remote session to managed endpoints How to inform endpoint about who connected during…

Patch Management

Comodo One. The Ins and Outs of Patch Management using Comodo ITSM

How to check patch status and deploy selected patches to devices How to check patch status of third party application on specific device How to…

Microphone

Warning! Your Headphones may be Functioning as a Microphone!

A new kind of malware can turn speakers to microphones. Dubbed “SPEAKE(a)R” it can also make computers eavesdrop on the surroundings. That’s not all –…