Wannacry

The WannaCry Ransomware Attack: Combating Ransomware is Possible

WannaCry, the ransomware that attacked networks in many leading healthcare organizations and other organizations across the globe on Friday, is hot news. WannaCry, which hit organizational networks in 150 countries on 12 May, 2017, targets systems/networks functioning on Microsoft Windows…

Ransomware Attacks

New TeslaCrypt Ransomware is Extremely Dangerous – Unless You’re Protected by Comodo

The model is familiar: Software developers work tirelessly to improve their product, releasing new versions to add new features or fix existing bugs, making their software as good as it can be. Well, it turns out, malware creators have been…

CryptoWall vs Comodo Containment

FROM THE COMODO LABS: Comodo Containment vs. Zeus/MitB

The security engineers and IT experts from the Comodo Threat Research Labs are constantly analyzing the thousands of malware families that are trying to cause destruction and chaos to IT infrastructures large and small – and ensuring the customers of…

Mac Malware

FROM THE COMODO ANTIVIRUS LABS: File infectors vs. Comodo Auto-Containment

The security engineers and IT experts from the Comodo Antivirus Labs are constantly analyzing the thousands of malware families that are trying to cause destruction and chaos to IT infrastructures large and small – and ensuring the customers of Comodo…

Artificial intelligence

Endpoint Security: Proactive Remote Computer Solutions Says We Trust Comodo

Companies large and small today face many of the same IT challenges – and one obstacle that all businesses are trying to hurdle is cybersecurity and protecting their endpoints from cyberattacks. Proactive Remote Computer Solutions (http://www.prcssupport.com) a managed services provider…

CryptoWall vs Comodo Containment

CryptoWall vs Comodo Containment

CryptoWall, the ransomware Trojan, is spread by spam emails, malware already on your computer, or drive-by downloads. Here’s how it works: 1. CryptoWall installs itself on your computer. 2. CryptoWall phones home by contacting the server belonging to CyberCrooks. 3.…

Cryptolocker

From The Comodo Think Tank: Cryptolocker, SpyEye and Shylock Malware are No Match for Comodo Containment Technology

Over the past few weeks, the engineers from the Comodo Think Tank have looked at some of the most feared malware and ransomware today, matching it up against Comodo’s containment technology. And the results? Cryptolocker fails against Comodo Containment. Shylock…

Containment Technology

SpyEye Vs Comodo Containment

SpyEye is a type of malware which Cybercriminals use to steal online banking credentials, credit card data, passwords, and other personal information. SpyEye has infected more than 1.4 million computers globally, and its silent attack means you’re delivering your information…

cybersecurity

Beware Ad Attacks: Malvertising is Booming

Remember when online security meant avoiding those sites on the wrong side of the tracks? No more. Malvertising is booming—not only in the number of attacks, but in sophistication as well. “Malicious advertising” is the illegal effort of spreading malware…

Social Security

Shylock vs Comodo Containment

Shylock is the notorious banking malware designed to fool you into giving your banking login and account details to Cybercrooks. If its name and behavior sound familiar, consider yourself well-read. A bit of trivia: Shylock earned its name by references…

Page 1 of 212