Reading Time: 4 minutes Increased dependency on computers and access to data makes an organization more vulnerable to cybersecurity threats. With the increase in cyber-criminals and cyber-attacks...
Reading Time: 3 minutes Disruptions are often unforeseen. This could be a catastrophic event like a hurricane, a fire, or an earthquake. Disruptions, however, can also come in other forms such as...
Reading Time: 4 minutes Today, organizations are constantly at risk from cyber-attacks. This is a major issue not only because of the traditional business risks, but because in today’s increasi...
Reading Time: 4 minutes There should be no doubt in anyone’s mind that the coronavirus pandemic will reshape our education systems. It has already altered how students around the world learn an...
Reading Time: 3 minutes The same question is asked by many companies that provide IT support and want to make the switch from a managed services provider (MSP) to a managed security services prov...
https://blog.comodo.com/case-studies/how-an-msp-transitioned-to-an-mssp-by-partnering-with-comodo/
Reading Time: 4 minutes Many people don’t take Potentially Unwanted Applications (PUA) as a serious danger. The reason for such a reckless attitude is that PUA are usually installed with the co...
https://blog.comodo.com/comodo-news/how-unwanted-applications-are-greater-security-threat/
Reading Time: 4 minutes Do you use Facebook Messenger? Do you use Chrome on your desktop? Do you also use Bitcoin and have a wallet? Would you install something that says that it’s a codec in o...
https://blog.comodo.com/comodo-news/facexworm-now-found-on-facebook/
Reading Time: 3 minutes Why should fathers day be about you alone? It could well be about your children, right? After all, they are your flesh and blood and the reason you are working hard. So le...
https://blog.comodo.com/pc-security/try-something-unique-this-fathers-day/
Reading Time: 2 minutes The latest malware to hit Mac operating systems is the EasyDoc Converter. Cyber security experts have discovered this dangerous Mac malware on reputed online websites offe...
https://blog.comodo.com/comodo-news/backdoor-malware-infects-mac-os-x/
Reading Time: 5 minutes Most of the malware created these days is designed to generate income to the malware authors. That’s not a surprise, but it is amazing how creative these digital crimina...
https://blog.comodo.com/comodo-news/malware-writers-find-new-ways-rip-us/
Reading Time: 2 minutes Comodo announced last week that our Comodo Internet Security Premium (CIS) software earned a 100% protection score in the most recent evaluation period of AV-Test.org. Com...
https://blog.comodo.com/comodo-news/av-test-labs-scores-comodo-as-perfect-protection-once-again/
Reading Time: 2 minutes Criminals use the latest to technology for a very old-fashioned reason, to steal folk’s money. If they can obtain your personal information, most significantly your logi...
https://blog.comodo.com/malware/hand-of-the-thief-trojan-can-it-pick-your-pocket/
Reading Time: 2 minutes “Comodo’s rise is almost meteoric”. That’s what Neil Rubenking, PC Magazine Lead Security Analyst, wrote about Comodo Internet Security 6 when examining the result...
https://blog.comodo.com/comodo-news/av-test-june-results-comodo-is-perfect-protection-for-windows-7/
Reading Time: 2 minutes People love baby pictures. Now that the Kate Middleton, aka the Duchess of Cambridge has given birth to a royal heir you can bet that the next great surge in Internet traf...
https://blog.comodo.com/pc-security/the-royal-birth-beware-of-those-baby-pics/
Reading Time: 2 minutes Everyone is talking about last week’s Syfi flick Sharknado, the insanely improbable tale of a rain of killer sharks on Los Angeles . A sequel has already been announced ...
https://blog.comodo.com/pc-security/whats-worse-than-sharknado-computer-malnado/
Reading Time: 1 minute Until recently, it has been conventional wisdom that the operating systems for mobile devices are much safer than for desktop and server computers and do not require the sa...
https://blog.comodo.com/comodo-news/comodo-technical-report-android-obad-trojan-virus-2/
Reading Time: 2 minutes Every computer, laptop, tablet and mobile phone connected to your network represents a vulnerable endpoint for viruses, worms, spyware, rootkits, trojan horses and other m...
https://blog.comodo.com/pc-security/cyber-crime-and-the-case-for-auto-sandboxing/
Reading Time: 1 minute Comodo Internet Security 4.0 is even more technologically advanced than ever before. 4.0 comes not only with Comodo’s award-winning Firewall, but also with our Defense+ H...
https://blog.comodo.com/it-security/cybersecurity-just-got-stronger/
Reading Time: 1 minute The amount of malware not detected by most PC Security software is increasing. This represents a heightened risk for Internet users. In March 2010, VirusTotal.com, a servic...
https://blog.comodo.com/malware/malicious-threats-present-a-growing-risk-for-internet-users/
Reading Time: 1 minute Most of the people we recently spoke to on the streets of New York didn’t know that around 50,000 new malware are created daily. We concluded that most people just don’...
https://blog.comodo.com/malware/50000-malware-created-daily/
Reading Time: 1 minute I recently read something interesting about a new malware. It’s a Trojan that’s been found to add a functionality known as “Spy Eye.” Analytical reports reveal that...