RF-10293_thb_6

Cybercrime on a Colossal Scale

Surely there are very few in the US, or among Internet-connected citizens elsewhere, who are not aware of the massive security breach suffered by Yahoo in 2013, but only recently acknowledged by the company. And it is really not as…

Monitors in ITSM

Comodo One. Understanding monitors in ITSM

Comodo One. Understanding monitors in ITSM What is ‘Monitoring’ in ITSM profiles How to configure ‘Monitors’ in profiles How to check monitoring logs How to monitor CPU/RAM/Network performance in devices How to Monitor Processes in devices How to Monitor Events…

Comodo One

Comodo One. Understanding Procedures

Comodo One. Understanding Procedures How to filter procedures How to create and run script procedure in devices How to schedule the procedure using profiles How to use script categories and keep them organized How to create and apply patch procedures…

Endpoint Protection

How To Choose Best Endpoint Protection Software for Business

Endpoint security is of prime importance today; we see lots of endpoint devices getting connected to enterprise networks, thereby increasing the chances of hacks and data breaches. Thus, it’s important that enterprises choose the best endpoint protection software for the…

Zero day exploits

Mozilla, Tor Release Patches to Block Active Zero Day Exploits

Mozilla and Tor recently released patches for the Firefox browser as well as the Firefox-based Tor browser aiming to block a recent attack. This attack exploited a Firefox animation remote code execution flaw to unmask users of the Tor anonymity…

Alerts in ITSM

Comodo One. Configuring alerts in ITSM

Comodo One. Configuring alerts in ITSM How to configure alerts How to create an automated alert ticket in Service desk using ‘Monitoring’ How to configure auto-remediation (fix) procedure if alert triggered from any monitor How to configure alerts You can…

Android security

Comodo Threat Research Labs Warns Android Users of “Tordow v2.0” outbreak

In late November 2016, Comodo Threat Research Labs discovered samples of the Android malware “Tordow v2.0” affecting clients in Russia. Tordow is the first mobile banking Trojan for the Android operating system that seeks to gain root privileges on infected…

Remote Endpoints

Comodo One. Takeover remote endpoints using ITSM

Takeover remote endpoints using ITSM How to prevent users from establishing the remote session to managed endpoints How to inform endpoint about who connected during Comodo Remote Control session How to use Comodo Remote Control for Multi-Monitors support Takeover remote…

Patch Management

Comodo One. The Ins and Outs of Patch Management using Comodo ITSM

How to check patch status and deploy selected patches to devices How to check patch status of third party application on specific device How to create “Third Party Patch Procedures” How to perform third party application update in ITSM How…

Microphone

Warning! Your Headphones may be Functioning as a Microphone!

A new kind of malware can turn speakers to microphones. Dubbed “SPEAKE(a)R” it can also make computers eavesdrop on the surroundings. That’s not all – it can listen even without being connected to a microphone! The capabilities of this malware…