phishing scams

Massive Phishing Attacks Hit Turkish Banks Users. But … is it Just Phishing?

The immense wave of phishing attacks hit the users of major banks in Turkey. Poisoned emails dropped into the users’ inboxes to covertly penetrate their…

IKARUS Ransomware

Indian Hospitals Crippled by Ransomware Attacks

Ransomware is pretty dreadful when it hits consumer PCs and smartphones. But ransomware is also frequently being used to target organizations and institutions around the…

Here’s What I Learned From the Latest Comodo Cybersecurity Global Threat Report

The second quarter 2018 Comodo Cybersecurity Global Threat Report has just been released! I couldn’t wait to read it, and I’m glad I did. It’s…

cybercriminals

Cybercriminals turn Microsoft Excel into their accessory with a new trick to attack users

Perpetrators go on inventing cunning techniques to attack users. One of the most popular tricks of infecting a computer is poisoned MS Office files with…

Online Security

How Secure is Your Network Against Internet-Based Attacks?

All You Need to Know About Network Security Protecting an organization’s network from Internet-based service attacks has become a serious concern in the recent years.…

Information Security & Risk Management Summit 2018

What We Learned at Gartner Information Security & Risk Management Summit 2018 in Maryland

The Gartner Information Security & Risk Management Summit at National Harbor, Maryland ran from June 3rd to 7th. Gartner’s event is a great opportunity for…

Cyber Security

Here’s What I Learned at RSAC 2018

The RSA Conference is one of the biggest events in the world of cybersecurity. I wasn’t there this year, but most of my colleagues were.…

cryptojacking

Are You One of the Millions Secretly Victimized by Cryptojacking?

Bitcoin… Blockchain… Cryptocurrency… and Now Cryptojacking! I know what you’re thinking… I have nothing to do with these technologies, why should I care? As of…

Comodo Cybersecurity

Day 2: RSA Conference

Without human intervention, a stone is just a stone. But when it is lifted and placed within a broader structure, like a winding country wall,…

Cyber Security

Day 1: RSA Conference 2018

There’s no better time than the present, or so they say. And when it comes to protecting sensitive data and finding increased guardianship in the…

X