Chrome Extentsion

Facebook Distributed Trojan Targets Cryptocurrency

Do you use Facebook Messenger? Do you use Chrome on your desktop? Do you also use Bitcoin and have a wallet? Would you install something…

phishing email

Password Stealer Hides In The Payment File And Hunts For Credentials

Cybercriminals’ big hunt for users’ credentials is gaining momentum rapidly. Their strategy usually stays the same: get attention of the victim, use social engineering techniques…

Website Security check

Website Security Checklist of 2018

Protect Your Website Against Security Threats Criminals follow money. Now that money has gone digital, it’s only natural that criminals have shifted their gaze to…

email security

How to Choose your Antispam Software

The ages when spam emails were easily spotted and the risks were not high are gone. In the current age of cyber crime, spam emails…

Cyber Security

Here’s What I Learned at RSAC 2018

The RSA Conference is one of the biggest events in the world of cybersecurity. I wasn’t there this year, but most of my colleagues were.…

identity theft attack

Massive identity theft attack stroke at universities from IP of … Brazilian law enforcement agency

Cybercriminals not only steal credentials or infect computers with malware. They also hunt for users’ personal data, including passports and IDs, physical addresses, phone numbers…

clean joomla website

Why Website Security Matters And How To Check?

Websites – especially business websites – present a lucrative option for hackers. Websites – especially business websites – present a lucrative option for hackers. They deal with…

Advanced Threat Protection

How Comodo Advanced Threat Protection Works?

Cyber threats are evolving at an exponential rate and are becoming more challenging to control. Wide-ranging security vulnerabilities, faster and more sophisticated cyber attacks are…

cryptojacking

Are You One of the Millions Secretly Victimized by Cryptojacking?

Bitcoin… Blockchain… Cryptocurrency… and Now Cryptojacking! I know what you’re thinking… I have nothing to do with these technologies, why should I care? As of…

Comodo Cybersecurity

Day 2: RSA Conference

Without human intervention, a stone is just a stone. But when it is lifted and placed within a broader structure, like a winding country wall,…

Page 1 of 6912345...102030...Last »