Cryptominers

Evil clone to attack users: how cybercrooks use legitimate software to spread cryptominers

Cryptomining has become a gold rush of nowadays, and cybercriminals are also seized by it. They invent more and more cunning gimmicks to infect users’…

What Is Internet Security

What is Internet Security?

Internet security is a branch of computer security which comprises various security measures exercised for ensuring the security of transactions done online. In the process,…

ransomware

From Russia with Subpoena: New Variant of Sigma Ransomware to Scare Users

Would you be scared or at least anxious if you’d found a subpoena to the US district court in your email box? Most of the…

Patch Management

Ticketfly Data Breach Means Music Fans Need to Go Elsewhere for Tickets

Summer has yet to officially start, but to me it feels like it’s begun already. My hometown of Toronto has been experiencing sweltering temperatures for…

Phishing Email

Phishing Trap for Microsoft Users | Phishing Attacks – Comodo

Phishing trap for One Drive users. How to avoid falling prey? Cybercriminals often use very cunning and inventive tricks to manipulate victim’s mind in phishing…

Comodo is The Best AV for PCs for February 2018

AV-TEST, an international cybersecurity research body, honored Comodo Antivirus as the best antivirus product for Windows PCs for the month of February. Comodo AV bested…

ITSM – The best cost effective solution for Better Service

A Gartner study reads, “By 2019, IT service desks utilizing machine learning enhanced technologies will free up to 30% of support capacity.” A tier of…

3 Important Things Windows Patch Management Should Do.

IT professionals understand the necessity of patches, even if it’s not one of their favorite things to do. However, if someone told you that there…

Family Business Web Filtering Solution- Comodo Dome

If you have kids, you know that the internet can be a dangerous place. But the internet can be equally, if not more dangerous to…

Computer Malware

Marketing can be a very powerful influence on our ability to accept situations that are sub-optimal

Sometimes a marketing analogy misleads us about the complex idea it is trying to simplify. A great example of this is equating PC security to…

X