Comodo ONE

Comodo One. Takeover remote endpoints using ITSM

ITSM’s ‘Takeover’ feature allows administrators to remotely access and control Windows devices to solve issues, install third party software and perform system maintenance. To take over a device: Open ITSM then click ‘Devices’ > ‘Device List’ and select your target…

Comodo ONE

Comodo One. The Ins and Outs of Patch Management using Comodo ITSM

How to check patch status and deploy selected patches to devices How to deploy patches from the ‘Patch Management’ interface How to add a patching schedule to a profile (including best practices) How to manually run a patch procedure on…

cybersecurity

Warning! Your Headphones may be Functioning as a Microphone!

A new kind of malware can turn speakers to microphones. Dubbed “SPEAKE(a)R” it can also make computers eavesdrop on the surroundings. That’s not all – it can listen even without being connected to a microphone! The capabilities of this malware…

ATM security

Cobalt Malware Threatens ATM Security

A cyber criminal collective known as the Cobalt Group is suspected to be behind the ATM malware “touchless jackpotting” attacks across 14 countries in Europe, including Netherlands, Russia, Britain, Poland, Romania and Spain. The group gets its name from their…

cybersecurity

Ransomware Served Through Online Ads

Cyber criminals have resorted to another sophisticated way of infecting user systems with ransomware and other malware. Malvertising or compromised advertising looks legitimate but serves malware that locks the systems. The malware – ransomware either locks the screen and access…

cybersecurity

Comodo Detects New Family of Sophisticated Financial Malware

Comodo Threat Research Labs (CTRL) has announced that it has detected a new family of financial malware dubbed as “Gugi/Fanta/Lime”. It is a sophisticated Banking Trojan that can bypass the standard security protocols of an Android operating system (version 6),…

ransomware

Comodo Senior Research Scientist Dr. Kenneth Geers Discusses Ransomware

Ransomware has now become a very common thing. Companies and organizations all the world over are getting attacked by ransomware, following which they have to face lots of serious issues including loss of money. Comodo’s Senior Research Scientist Dr. Kenneth…

Linux kernel

The Importance of Linux Kernel Live Patching in IT

The importance of live patching of Linux kernel came to light with the recent Dirty COW vulnerability. The Dirty COW privilege escalation vulnerability shook the Linux world – all the kernels released in the past nine years were affected, and…

vulnerability scanning

Massive Internet Outage Powered by IoT Devices

Using hacked “Internet of Things” (IoT) devices, cyber criminals had launched a massive internet attack on the Internet infrastructure company – Dyn, leading to a mammoth internet outage that affected major websites like Twitter, Reddit, Netflix, Spotify, Tumblr and Amazon.…

cybersecurity

Massive Cybersecurity Breach at Yahoo

On Sep 22, 2016, Yahoo issued a press release: “A recent investigation by Yahoo! Inc. has confirmed that a copy of certain user account information was stolen from the company’s network in late 2014 by what it believes is a…

Page 1 of 5512345...102030...Last »