Chrome Extentsion

Facebook Distributed Trojan Targets Cryptocurrency

Do you use Facebook Messenger? Do you use Chrome on your desktop? Do you also use Bitcoin and have a wallet? Would you install something…

Cyber Security

Here’s What I Learned at RSAC 2018

The RSA Conference is one of the biggest events in the world of cybersecurity. I wasn’t there this year, but most of my colleagues were.…

identity theft attack

Massive identity theft attack stroke at universities from IP of … Brazilian law enforcement agency

Cybercriminals not only steal credentials or infect computers with malware. They also hunt for users’ personal data, including passports and IDs, physical addresses, phone numbers…

Comodo Cybersecurity

Day 2: RSA Conference

Without human intervention, a stone is just a stone. But when it is lifted and placed within a broader structure, like a winding country wall,…

Managed Security Service

Comodo Cybersecurity Achieves the Gold Standard SC Award for Best Managed Security Service

With breaches happening every day, it is not an easy task for customers to stay ahead of hackers. This is especially true for organizations with…

rsa 2018

Usability or Bust: Day Four

Sometimes life just doesn’t make sense. As humans, we are capable of creating and implementing so many remarkable things, and yet we often struggle to…

Cyber Security

Day 1: RSA Conference 2018

There’s no better time than the present, or so they say. And when it comes to protecting sensitive data and finding increased guardianship in the…

Comodo Cybersecurity

Comodo Cybersecurity Q1 2018 Global Malware Report: cybercriminals follow the money, cryptominers leap ahead of ransomware

In Q1 2018, Comodo Cybersecurity Threat Research Labs’ experts analyzed 300 million malware incidents worldwide and witnessed the sharp rise of cryptomining attacks, a surprising…

Top Comodo Antivirus

Comodo Cybersecurity’s Consumer Antivirus Named “Top Product” by AV-Test

We’re excited to announce that Comodo Cybersecurity’s consumer anti-virus product was named a “Top Product” by the AV-Test Institute, an independent IT security and AV…

Endpoint Security

Comodo experts prevent new attack on LinkedIn users

Cybercriminal attacks on social media user accounts to gain access to user credentials are becoming more refined and sophisticated. Phishing email tricks, often based on…

Page 1 of 1812345...10...Last »