Comodo Threat Research Labs

Comodo Q1 2017 Threat Report: Russia is World’s No. 1 Malware Target

Comodo Threat Research Labs (CTRL) detected more than 25 million malware incidents in 223 top-level country code domains (ccTLD), in nearly every nation, province, state…

Endpoint Security

Cyber-threat Alert: Summer 2017 Phishing Trip to Avoid

A Special Update from the Comodo Threat Intelligence Lab Phishing attacks using emails have become very common but the techniques are continually being enhanced and…

Comodo Containment Technology

Tackling Cyber Security Threats in 2017

Businesses are on a helter-skelter as the current waves of cyber attacks make them double their efforts in protecting their operations as well as their…

There is no such thing as good malware

There is no such thing as good malware

There used to be a meme going around that stated “there are two types of companies in the world, those who know they have been…

American independence day 2017

The 4th of July and the State of Online Security

The Fourth of July is an opportunistic time for shoppers to buy products that are currently in season with the best deals. Name any big…

Ransomware

Petya Ransomware | How It Spreads and How to Stay Ahead

After an examination of the encryption routine of the malware utilized as a part of the Petya/ExPetr assaults, experts understand that the malware author can’t…

web security

Comodo One. Comodo Remote Control – Faster and Easier Remote Desktop Connections for MSPs

One of the priorities of the Comodo One (C1) project is to put an end to the fragmented software model for MSPs. We intend to…

Making Sense of Needs vs. Cyber Vendor Claims: Analyst Meets Expert

With malware ransoms now rising to as high as $1M (USD), there is heightened urgency for organizations and their CISOs, CSOs and other leaders to understand…

Endpoint Protection

Best 10 Features of an Effective Endpoint Security Strategy

With overwhelming cyber attacks happening through malicious apps on mobile devices, security geeks are to intensify the endpoint security measures multiple folds. Setting up stringent…

Fathers Day

Try Something Unique This Father’s Day

Why should fathers day be about you alone? It could well be about your children, right? After all, they are your flesh and blood and…

Page 5 of 64« First...34567...102030...Last »