Reading Time: 4 minutes Increased dependency on computers and access to data makes an organization more vulnerable to cybersecurity threats. With the increase in cyber-criminals and cyber-attacks...
Reading Time: 3 minutes Rapid technological growth and increasing digitalization in all aspects of life around the world have increased the value of ensuring cyber-security at all levels. This is...
Reading Time: 3 minutes Disruptions are often unforeseen. This could be a catastrophic event like a hurricane, a fire, or an earthquake. Disruptions, however, can also come in other forms such as...
Reading Time: 4 minutes Today, organizations are constantly at risk from cyber-attacks. This is a major issue not only because of the traditional business risks, but because in today’s increasi...
Reading Time: 4 minutes There should be no doubt in anyone’s mind that the coronavirus pandemic will reshape our education systems. It has already altered how students around the world learn an...
Reading Time: 4 minutes With the market expected to reach US$ 248.6 billion by 2023, the cybersecurity space is flourishing globally. In the past 13 years, the cybersecurity market has grown by m...
Reading Time: 3 minutes Celebrate National Cybersecurity Awareness Month By Learning to Protect Against Ransomware Attacks It’s the season for pumpkin picking, leaves changing color, getting re...
https://blog.comodo.com/comodo-news/protect-business-from-ransomware-attacks/
Reading Time: 3 minutes Usually summer means vacation and relaxation. But as we’ve seen in recent history, summer plans can be brutally disrupted when cyber threats strike. Just two years ago, ...
https://blog.comodo.com/malware/dont-forget-your-security-protection-framework-in-this-summer/
Reading Time: 4 minutes It’s a mad, mad, mad, malware world. The good news is that the number of malware attacks is decreasing. The bad news is that malware forms are proliferating, attacker...
https://blog.comodo.com/cybersecurity/defensive-approach-to-malware/
Reading Time: 5 minutes The arms race between cybercriminals and cybersecurity warriors is increasing at an enormous speed. Malware authors immediately react on any detected and neutralized malwa...
https://blog.comodo.com/comodo-news/gandcrab-the-new-version-of-ransomware/
Reading Time: 4 minutes Many people don’t take Potentially Unwanted Applications (PUA) as a serious danger. The reason for such a reckless attitude is that PUA are usually installed with the co...
https://blog.comodo.com/comodo-news/how-unwanted-applications-are-greater-security-threat/
Reading Time: 4 minutes If you ask a malware analyst to name the most dangerous and nefarious trojans, Emotet will be definitely present in the list. According to the National Cybersecurity and C...
https://blog.comodo.com/comodo-news/new-immense-attack-emotet-trojan-targeted-thousands-users/
Reading Time: 4 minutes An airgapped machine is a computer that is so heavily secured that it has no physical or digital connections to any networks. They’re usually also heavily physically sec...
https://blog.comodo.com/comodo-news/tick-infecting-airgap-machines/
Reading Time: 4 minutes Talks of Korean reunification have made me feel very optimistic. The Korean War has had a devastating effect on Koreans on both sides of the heavily guarded border. Famili...
https://blog.comodo.com/comodo-news/malware-spikes-up-during-trump-north-korea-tensions/
Reading Time: 5 minutes There’s no better time than the present, or so they say. And when it comes to protecting sensitive data and finding increased guardianship in the digital age, this adage...
https://blog.comodo.com/comodo-news/day-1-rsa-conference-2018/
Reading Time: 1 minute In this Infographic Comodo brings about the malware threats that took place 2017 globally and the trojan and virus threats to be expected for 2018 The post Comod...
https://blog.comodo.com/comodo-news/comodo-malware-report-2017-key-threat-findings/
Reading Time: 2 minutes 2017 will long be remembered as the year of information breaches. It was also a year of security analysis in enterprise security and multiple geopolitical events that corr...
https://blog.comodo.com/comodo-news/comodo-2017-global-malware-report/
Reading Time: 5 minutes In the first few weeks of 2018, cybercriminals targeted five universities, 23 private companies and several government organizations. Despite the new, sophisticated types ...
https://blog.comodo.com/comodo-news/comodo-protects-five-universities-new-malware-steals-data/
Reading Time: 3 minutes Sometimes a marketing analogy misleads us about the complex idea it is trying to simplify. A great example of this is equating PC security to the immune system of the huma...
Reading Time: 3 minutes Every component of an operating system adds new functionality, and at the same time, creates potential openings for new forms of malware. Recently, a potential risk was id...
https://blog.comodo.com/comodo-news/understanding-mitigating-bashware-similar-threats/
Reading Time: 2 minutes Some people would love to work for a highly ethical company, one where trust is absolute, and everyone is treated equally. Where peace and love are considered the only att...
https://blog.comodo.com/comodo-news/work-for-a-bunch-hippies-commune/
Reading Time: 2 minutes Comodo Threat Research Labs (CTRL) detected more than 25 million malware incidents in 223 top-level country code domains (ccTLD), in nearly every nation, province, state a...
https://blog.comodo.com/comodo-news/comodo-q1-2017-threat-report/
Reading Time: 3 minutes In 2003, Oxford University Philosophy Professor Nick Bostrom posed the following question: what if an artificial intelligence (AI) machine were given just one task: to cre...
https://blog.comodo.com/comodo-news/alan-turing-undecidable-problems-and-malware/
Reading Time: 5 minutes Since 2013, the CryptoLocker malware has been making its way across the Internet in various forms, in various iterations. CryptoLocker is a ransomware trojan which targets...
https://blog.comodo.com/comodo-news/e-fax-contain-cryptolocker/
Reading Time: 3 minutes The security engineers and IT experts from the Comodo Labs are constantly analyzing the thousands of malware families that are trying to cause destruction and chaos to IT ...
Reading Time: 3 minutes The Comodo Antispam Labs (CASL) team has identified a malware attack targeted specifically at businesses and consumers who may use UK Mail, the United Kingdom’s largest ...
https://blog.comodo.com/malware/malware-attack-targets-uk-mail/
Reading Time: 1 minute That’s the question that Comodo Director of Technology Fatih Orhan put forth in a new byline article just posted in Computer Technology Review magazine. Is it possible th...
https://blog.comodo.com/comodo-news/does-cpu-power-use-your-own-computer-for-evil/
Reading Time: 2 minutes Remember when online security meant avoiding those sites on the wrong side of the tracks? No more. Malvertising is booming—not only in the number of attacks, but in soph...
https://blog.comodo.com/malware/beware-ad-attacks-malvertising-is-booming/
Reading Time: 1 minute Shylock is the notorious banking malware designed to fool you into giving your banking login and account details to Cybercrooks. If its name and behavior sound familiar, co...
https://blog.comodo.com/containment/shylock-vs-comodo-containment/
Reading Time: 3 minutes Spam email is to the Internet what pollution is to waterways and phishing email is the most toxic of digital pollutants. Current measures for dealing with unsolicited mail...
https://blog.comodo.com/comodo-news/comodo-korumail-comprehensive-solution-spam-onslaught/
Reading Time: 5 minutes Most of the malware created these days is designed to generate income to the malware authors. That’s not a surprise, but it is amazing how creative these digital crimina...
https://blog.comodo.com/comodo-news/malware-writers-find-new-ways-rip-us/
Reading Time: 3 minutes Between Flash and PDF Reader alone, Adobe is ubiquitous on today’s desktop. Have you ever registered for an Adobe product? If you have, you should seriously consider cha...
https://blog.comodo.com/e-commerce/how-safe-is-encrypted-credit-card-data/
Reading Time: 2 minutes Besides using Comodo Internet Security, the best way to protect your computer is to keep up with all of the security updates for you operating system. The Windows OS is th...
https://blog.comodo.com/malware/apple-rolls-out-security-updates-for-os-x-mountain-lion-safari/
Reading Time: 2 minutes Criminals use the latest to technology for a very old-fashioned reason, to steal folk’s money. If they can obtain your personal information, most significantly your logi...
https://blog.comodo.com/malware/hand-of-the-thief-trojan-can-it-pick-your-pocket/
Reading Time: 2 minutes People love baby pictures. Now that the Kate Middleton, aka the Duchess of Cambridge has given birth to a royal heir you can bet that the next great surge in Internet traf...
https://blog.comodo.com/pc-security/the-royal-birth-beware-of-those-baby-pics/
Reading Time: 2 minutes Every computer, laptop, tablet and mobile phone connected to your network represents a vulnerable endpoint for viruses, worms, spyware, rootkits, trojan horses and other m...
https://blog.comodo.com/pc-security/cyber-crime-and-the-case-for-auto-sandboxing/
Reading Time: 1 minute Most of the people we recently spoke to on the streets of New York didn’t know that around 50,000 new malware are created daily. We concluded that most people just don’...
https://blog.comodo.com/malware/50000-malware-created-daily/
Reading Time: 1 minute I recently read something interesting about a new malware. It’s a Trojan that’s been found to add a functionality known as “Spy Eye.” Analytical reports reveal that...