There is no such thing as good malware

In The Crab’s Claws: The New Version Of Ransomware Hits Everyone But Russians

The arms race between cybercriminals and cybersecurity warriors is increasing at an enormous speed. Malware authors immediately react on any detected and neutralized malware with…

malware attack

The Way of Double Deception: Why Unwanted Applications are a Greater Threat than You Realize

Many people don’t take Potentially Unwanted Applications (PUA) as a serious danger. The reason for such a reckless attitude is that PUA are usually installed…

Cyber Security

New Immense Attack of Emotet Trojan Targeted Thousands of Users

If you ask a malware analyst to name the most dangerous and nefarious trojans, Emotet will be definitely present in the list. According to the…

malware attacks

This Tick Can Fly Through Airgaps

An airgapped machine is a computer that is so heavily secured that it has no physical or digital connections to any networks. They’re usually also…

malware attacks

Tension Between Donald Trump and North Korea Coincides with Malware Spikes

Talks of Korean reunification have made me feel very optimistic. The Korean War has had a devastating effect on Koreans on both sides of the…

Cyber Security

Day 1: RSA Conference 2018

There’s no better time than the present, or so they say. And when it comes to protecting sensitive data and finding increased guardianship in the…

There is no such thing as good malware

Comodo Global Malware Report of 2017: Key Findings in Threats

In this Infographic Comodo brings about the malware threats that took place 2017 globally and the trojan and virus threats to be expected for 2018…

Information Security & Risk Management Summit 2018

Comodo 2017 Global Malware Report: Cyber Risks and Geopolitical Threats

2017 will long be remembered as the year of information breaches. It was also a year of security analysis in enterprise security and multiple geopolitical…

Advanced Threat Protection

Comodo protects five universities from new malware that steals data

In the first few weeks of 2018, cybercriminals targeted five universities, 23 private companies and several government organizations. Despite the new, sophisticated types of malware…

Computer Malware

Marketing can be a very powerful influence on our ability to accept situations that are sub-optimal

Sometimes a marketing analogy misleads us about the complex idea it is trying to simplify. A great example of this is equating PC security to…

X