Comodo Remembers 9/11

The 9/11 attack had increased everyone’s consciousness on safety, sacrifices, and bravery. Thus, it made a great impact on how people perceive safety – including…

Ransomware

The Cost of “Free” Public Wifi

No, we don’t mean to say that free public wifi(s) are no longer free. They will be as long as you have hotels, restaurants, cafes,…

locky ransomware

2nd Wave of IKARUS Ransomware Attacks Uses Your Scanner/Printer, Post Office Billing Inquiry

Should you fear your office scanner/printer? How about your post office? A second wave of new but related IKARUSdilapidated Locky ransomware attacks has occurred, building…

Endpoint Security Upgrade

Is Your Endpoint Security Upgrade Not a ’10?’ Here’s 5 Tips

Upgrade issues and a checkered history of customer infections are good reasons to reevaluate your options for endpoint protection. Even leading analysts agree that the…

endpoint malware

Comodo Newsletter – Making Sense of Endpoint Malware Protection Technology

Download the latest newsletter from Comodo featuring Gartner research to learn how to make sense of endpoint malware protection technology as well as how you…

locky ransomware

New Locky Ransomware Trojan Spotted this August 2017

New Ransomware, Botnet Threat: IKARUSdilapidated Attack is August ’17 Locky Rebirth A Special Update from the Comodo Threat Intelligence Lab A new August 2017 ransomware…

Web security

Many US Banks Failed Web Security Testing

An anonymous audit on web security in US banks conducted by the Online Trust Alliance (OTA) – a non-profit organization, has revealed that 65% of…

Patch management

Do you think retailers are Compromising on IT Security

Digital transformation is speeding up especially in the retail section. Store environment is feeling the heat that they need to catch up with the implementation…

ransomware

Security has to start and end with trust.

When you use a company’s security solution, you are placing your reputation in their hands, and you must trust their ability to think through how…

Endpoint Security – Most Enterprises May Be Wasting Money on Ineffective Solutions

There are endpoint security solutions but there are better endpoint security solutions. There are so many endpoint security solutions available that would confuse even a…

Page 3 of 6412345...102030...Last »