Reading Time: 4 minutes Increased dependency on computers and access to data makes an organization more vulnerable to cybersecurity threats. With the increase in cyber-criminals and cyber-attacks...
Reading Time: 3 minutes Rapid technological growth and increasing digitalization in all aspects of life around the world have increased the value of ensuring cyber-security at all levels. This is...
Reading Time: 4 minutes There should be no doubt in anyone’s mind that the coronavirus pandemic will reshape our education systems. It has already altered how students around the world learn an...
Reading Time: 3 minutes The proliferation of ransomware in recent times has made many companies sit up and assess their existing IT infrastructure, especially their IT security solutions. While m...
Reading Time: 2 minutes Ransomware and malware are two major cybersecurity threats facing companies around the globe. The total cost of ransomware attacks is expected to reach $20 billion by 2021...
Reading Time: 2 minutes Cyber breaches are quite common in the medical industry. In 2019 alone, over 40 million patient records were breached, an almost 50% increase in cases from the previous ye...
Reading Time: 3 minutes We’ve all been there: You’re doing research online and download a new program onto your computer. Suddenly a pop-up on the bottom of your desktop informs you something...
Reading Time: 4 minutes Every year as we approach the holiday season, millions prepare to celebrate a popular Italian annual tradition: the Feast of Seven Fishes. But while most individuals look ...
https://blog.comodo.com/comodo-news/7-phishes-you-dont-want-this-holiday/
Reading Time: 2 minutes WannaCry, the ransomware that attacked networks in many leading healthcare organizations and other organizations across the globe on Friday, is hot news. WannaCry, which h...
https://blog.comodo.com/containment/wannacry-ransomware-attack-combating-ransomware-possible/
Reading Time: 2 minutes The model is familiar: Software developers work tirelessly to improve their product, releasing new versions to add new features or fix existing bugs, making their software...
https://blog.comodo.com/containment/stay-protected-from-dangerous-teslacrypt-ransomware-with-comodo/
Reading Time: 4 minutes The security engineers and IT experts from the Comodo Threat Research Labs are constantly analyzing the thousands of malware families that are trying to cause destruction ...
https://blog.comodo.com/containment/comodo-containment-vs-zeus-mitb/
Reading Time: 2 minutes The security engineers and IT experts from the Comodo Antivirus Labs are constantly analyzing the thousands of malware families that are trying to cause destruction and ch...
https://blog.comodo.com/containment/fileinfectors-vs-comodo-auto-containment/
Reading Time: 2 minutes Companies large and small today face many of the same IT challenges – and one obstacle that all businesses are trying to hurdle is cybersecurity and protecting their end...
Reading Time: 1 minute CryptoWall, the ransomware Trojan, is spread by spam emails, malware already on your computer, or drive-by downloads. Here’s how it works: 1. CryptoWall installs itself o...
https://blog.comodo.com/containment/cryptowall-vs-comodo-containment/
Reading Time: 3 minutes Over the past few weeks, the engineers from the Comodo Think Tank have looked at some of the most feared malware and ransomware today, matching it up against Comodo’s co...
Reading Time: 1 minute SpyEye is a type of malware which Cybercriminals use to steal online banking credentials, credit card data, passwords, and other personal information. SpyEye has infected m...
https://blog.comodo.com/comodo-news/spyeye-vs-comodo-containment/
Reading Time: 2 minutes Remember when online security meant avoiding those sites on the wrong side of the tracks? No more. Malvertising is booming—not only in the number of attacks, but in soph...
https://blog.comodo.com/malware/beware-ad-attacks-malvertising-is-booming/
Reading Time: 1 minute Shylock is the notorious banking malware designed to fool you into giving your banking login and account details to Cybercrooks. If its name and behavior sound familiar, co...
https://blog.comodo.com/containment/shylock-vs-comodo-containment/
Reading Time: 1 minute Cryptolocker, the ransomware Trojan, works like this: 1. Reads a file 2. Encrypts that file 3. Overwrites original file with encrypted file 4. Demands ransom But when Crypt...
https://blog.comodo.com/containment/cryptolocker-meets-comodo-containment-technology/