Email Security

Alert: Wells Fargo Phishing Scam

Comodo has detected a new Wells Fargo scam email that appears to be sent via a server in United States. The email contains a clickable…

cybersecurity

Beware Ad Attacks: Malvertising is Booming

Remember when online security meant avoiding those sites on the wrong side of the tracks? No more. Malvertising is booming—not only in the number of…

Social Security

Shylock vs Comodo Containment

Shylock is the notorious banking malware designed to fool you into giving your banking login and account details to Cybercrooks. If its name and behavior…

Comodo Containment Technology

Fradulent Bank Website Bears Alarming Resemblance

Fradulent Bank Website Bears Alarming Resemblance Comodo’s Anti-spam lab has discovered a fradulent bank posing frighteningly similar to a legitimate banking website. The fraudulent website…

OpenSSL

OpenSSL Security Advisory

OpenSSL has recently disclosed a high severity vulnerability that may require you to upgrade your version of OpenSSL. Comodo anticipates this flaw will only affect…

Cryptolocker

Cryptolocker vs Comodo’s Containment

Cryptolocker, the ransomware Trojan, works like this: 1. Reads a file 2. Encrypts that file 3. Overwrites original file with encrypted file 4. Demands ransom…

Paypal Phishing

Alert: New PayPal Phishing Scam

Comodo has identified a new PayPal phishing email, which is being sent via a server in Turkey. Because PayPal uses email to contact its customers,…

Twitter Scams

Twitter Direct Message Phishing Scams Continue

Phishing scams are continuing to plague Twitter users, now through the platform’s Direct Message (DM) feature. As many people know, with the DM feature, users…

Free Amazon Gift Card? Just Say No!

Android users throughout North American are being text message spammed with a link promising a free $200 Amazon credit card. Clicking on the link would…

FREAK Attack Warning: Apple and Google Devices Most Vulnerable

An SSL/TLS vulnerability has been identified that attackers could use to downgrade the cryptography of HTTPS connections to one vulnerable to decryption. allowing attackers to…

Page 20 of 65« First...10...1819202122...304050...Last »