Reading Time: 4 minutes Increased dependency on computers and access to data makes an organization more vulnerable to cybersecurity threats. With the increase in cyber-criminals and cyber-attacks...
Reading Time: 3 minutes Rapid technological growth and increasing digitalization in all aspects of life around the world have increased the value of ensuring cyber-security at all levels. This is...
Reading Time: 3 minutes Disruptions are often unforeseen. This could be a catastrophic event like a hurricane, a fire, or an earthquake. Disruptions, however, can also come in other forms such as...
Reading Time: 4 minutes Today, organizations are constantly at risk from cyber-attacks. This is a major issue not only because of the traditional business risks, but because in today’s increasi...
Reading Time: 4 minutes There should be no doubt in anyone’s mind that the coronavirus pandemic will reshape our education systems. It has already altered how students around the world learn an...
Reading Time: 4 minutes With the market expected to reach US$ 248.6 billion by 2023, the cybersecurity space is flourishing globally. In the past 13 years, the cybersecurity market has grown by m...
Reading Time: 3 minutes The same question is asked by many companies that provide IT support and want to make the switch from a managed services provider (MSP) to a managed security services prov...
https://blog.comodo.com/case-studies/how-an-msp-transitioned-to-an-mssp-by-partnering-with-comodo/
Reading Time: 3 minutes Overview One of thefirst times the public witnessedfirsthandand realized the power of ransomware was when WannaCry broke out in 2017. The government, education, hospitals,...
Reading Time: 3 minutes Ransomware is on the rise. From major cities like Atlanta and Baltimore to small towns everywhere from Florida to North Dakota, we’re seeing increasing numbers of malwa...
Reading Time: 3 minutes With another year nearly behind us, this holiday season is the perfect time to start considering next year’s resolutions. But while setting personal goals surrounding he...
https://blog.comodo.com/mobile-security/happy-holidays-from-comodo-cybersecurity/
Reading Time: 3 minutes Early warning systems save lives. People in tsunami risk zones rely on seismic activity sensors and sea level gauges for advance alerts that give them time to get to safet...
Reading Time: 3 minutes ‘Tis the season for holiday shopping. Economic forecasters anticipate holiday retail sales will reach a new all-time high in 2019, with U.S. spending set to top $725 bi...
https://blog.comodo.com/e-commerce/avoid-becoming-a-victim-on-black-friday-and-cyber-monday/
Reading Time: 3 minutes National Cybersecurity Awareness Month is now well underway, and this year’s theme is “Own IT. Secure IT. Protect IT.” The core message is simple: today’s business...
https://blog.comodo.com/comodo-news/forensic-analysis-tools/
Reading Time: 3 minutes Celebrate National Cybersecurity Awareness Month By Learning to Protect Against Ransomware Attacks It’s the season for pumpkin picking, leaves changing color, getting re...
https://blog.comodo.com/comodo-news/protect-business-from-ransomware-attacks/
Reading Time: 3 minutes Usually summer means vacation and relaxation. But as we’ve seen in recent history, summer plans can be brutally disrupted when cyber threats strike. Just two years ago, ...
https://blog.comodo.com/malware/dont-forget-your-security-protection-framework-in-this-summer/
Reading Time: 4 minutes Many people don’t take Potentially Unwanted Applications (PUA) as a serious danger. The reason for such a reckless attitude is that PUA are usually installed with the co...
https://blog.comodo.com/comodo-news/how-unwanted-applications-are-greater-security-threat/
Reading Time: 4 minutes If you’re into gaming, you’ve probably heard of Fortnite: Battle Royale. Epic Games’ popular new online title debuted on consoles and PCs in September 2017, on iOS t...
https://blog.comodo.com/comodo-news/fake-fortnite-game-android-trojans/
Reading Time: 3 minutes Many of us are dependent on the computers and smart devices to complete our official, personal and household duties. The benefits are numerous but the threat posed by onli...
https://blog.comodo.com/malware/different-techniques-for-malware-analysis/
Reading Time: 4 minutes Comodo publishes strategic analysis of 97 million malware incidents in Q2 Comodo detected and analyzed nearly 100 million incidents in Q2 2017, almost quadruple the number...
https://blog.comodo.com/malware/comodo-publishes-strategic-analysis-of-97m-malware-incidents-in-q2/
Reading Time: 3 minutes A cyber criminal collective known as the Cobalt Group is suspected to be behind the ATM malware “touchless jackpotting” attacks across 14 countries in Europe, includin...
https://blog.comodo.com/malware/cobalt-malware-threatens-atm-security/
Reading Time: 3 minutes We are starting to see it more and more: ransomware attacks are on the rise – and we’ve been seeing it especially (and unfortunately) in the medical profession lately,...
https://blog.comodo.com/malware/why-are-ransomware-attacks-occurring-with-increasing-frequency/
Reading Time: 3 minutes The Comodo Antispam Labs (CASL) team has identified a new malware attack targeted specifically at businesses and consumers who might use WhatsApp, a multi-platform mobile ...
https://blog.comodo.com/malware/whatsapp-new-malware-attack/
Reading Time: 3 minutes The Comodo Antispam Labs (CASL) team has identified a malware attack targeted specifically at businesses and consumers who may use UK Mail, the United Kingdom’s largest ...
https://blog.comodo.com/malware/malware-attack-targets-uk-mail/
Reading Time: 2 minutes Remember when online security meant avoiding those sites on the wrong side of the tracks? No more. Malvertising is booming—not only in the number of attacks, but in soph...
https://blog.comodo.com/malware/beware-ad-attacks-malvertising-is-booming/
Reading Time: 2 minutes Everyone loves to get something for free. Over the past few weeks thousands of people have not let a little thing like copyright law stop them from enjoying at least 5 cur...
Reading Time: 3 minutes Selfmite is a Worm, a category of computer virus. A worm contains malicious code that uses system networks to replicate themselves. They are major threat to a computer and...
https://blog.comodo.com/malware/understanding-android-sms-virus-selfmite/
Reading Time: 1 minute Oracle has released security updates to address BASH bug vulnerabilities found across multiple products. However, Oracle also included in its announcement a list of 42 Orac...
https://blog.comodo.com/malware/oracle-battles-bash-bug-much-work-left/
Reading Time: 3 minutes So called “autorun viruses” were developed to infect external devices, such as infecting a victim’s PC while opening a flash drive in Windows Explorer. An autorun vi...
https://blog.comodo.com/malware/manually-removing-autorun-virus/
Reading Time: 1 minute IT is on high alert to deal with a fault in the BASH command interpreter found on Unix OS variants that could allow a hacker to take control of the computer. Apple is one...
https://blog.comodo.com/malware/bash-update-apple-scramble-deal-bash-bug/
Reading Time: 2 minutes We are happy to report more independent evidence that you can sleep tight at night with Comodo Antivirus, even from some of the most sophisticated surveillance software us...
https://blog.comodo.com/comodo-news/comodo-antivirus-conquers-weapons-grade-grade-surveillance/
Reading Time: 1 minute Microsoft’s September “Patch Tuesday” security updates this week included 37 security patches for Internet Explorer, including a critical zero day defect. The term ze...
https://blog.comodo.com/malware/microsoft-patches-critical-internet-explorer-bugs/
Reading Time: 2 minutes If you would really like to be infected by malware, the best place to go these days is amazon.com! According to a quarterly report for Q2 2014 by Solutionary’s Security ...
https://blog.comodo.com/malware/report-amazon-leads-malware-hosts-getting-worse/
Reading Time: 1 minute According to Homeland Securities Computer Emergency Response Team (US-CERT) SpamTitan contains a reflected cross-site scripting (XSS) vulnerability. SpamTitan is a server s...
https://blog.comodo.com/malware/alert-spamtitan-users-risk-cross-site-scripting-vulnerability/
Reading Time: 6 minutes Contributors: Ionel Pomana, Kevin Judge Video games have played an important role in the history of computers and are a significant reason for their popularity as a consum...
https://blog.comodo.com/comodo-news/comodo-av-labs-warn-phishing-scam-targeting-gamers/
Reading Time: 2 minutes Ransomware is quickly becoming the scourge of the Internet and Cisco Systems is reporting that several very popular web sites have recently been distribution points via ma...
https://blog.comodo.com/malware/cisco-popular-sites-spreading-ransomware-via-mavlertising/
Reading Time: 4 minutes On Monday, the US Department of Justice announced that law enforcement working in multiple countries had successfully seized control of the “Gameover Zeus” botnet that...
https://blog.comodo.com/comodo-news/law-enforcement-2-weeks-protect/
Reading Time: 2 minutes The case for a containment strategy to defend against malware grew even stronger this week with reports that hackers are using vulnerabilities in Microsoft’s Silverlight...
https://blog.comodo.com/malware/hackers-target-silverlight-deliver-malware/
Reading Time: 2 minutes Improving privacy and security while browsing has been a major objective for Comodo in recent product releases and enhancements, and a Senate subcommittee report yesterday...
https://blog.comodo.com/malware/senate-report-warns-dangers-online-advertising-malvertising/
Reading Time: 5 minutes Most of the malware created these days is designed to generate income to the malware authors. That’s not a surprise, but it is amazing how creative these digital crimina...
https://blog.comodo.com/comodo-news/malware-writers-find-new-ways-rip-us/
Reading Time: 4 minutes It is virtually impossible for the files of known viruses used by conventional scanners to be fully up to date. Independent tester AV-Test Labs recently estimated that the...
https://blog.comodo.com/malware/understanding-containment-malware-defense-real-world/
Reading Time: 2 minutes Over the past 6 months US retailers and American consumers have been rocked by a string of high profile Point of Sale System card data breaches, starting with the massive ...
https://blog.comodo.com/e-commerce/michaels-data-breach-effects-3-million-cardholders/
Reading Time: 2 minutes Phishing is associated with fraudulent activities and stealing personal information on web. The sensitive information including passwords, ID and details of credit cards a...
Reading Time: 3 minutes Any list of memorable computer viruses would have to include the SQL Slammer virus, unleashed in 2003. I certainly remember it. I was with UPS IT at the time and we had mu...
https://blog.comodo.com/malware/virus-hall-fame-sql-slammer-virus/
Reading Time: 2 minutes Unlike their desktop/laptop rival Microsoft, Apple does not go out of its way to alert their user base that they are withdrawing support for a version of their Operating S...
https://blog.comodo.com/malware/apple-leaves-snow-leopard-in-the-cold-users-vulnerable/
Reading Time: 2 minutes Definition of Win32 Vobfus xc Virus: Win32 Vobfus xc is a risky Trojan Virus which PC users should have removed from the target computer completely. The newly released Tro...
https://blog.comodo.com/malware/how-to-remove-win32-vobfus-xc/
Reading Time: 2 minutes Online shopping, online banking and general storage of personal information on personal computers have made consumers more vulnerable to identity theft than ever before. Y...
https://blog.comodo.com/malware/an-intro-to-spyware-and-trojans/
Reading Time: 2 minutes The US military may be trained to dodge bullets and bombs, but now they are being targeted with bits and bytes in the ever expanding cyberwar. Microsoft has confirmed that...
https://blog.comodo.com/malware/internet-explorer-10-exploit-used-to-target-us-military/
Reading Time: 3 minutes The notorious ZeuS Banking Trojan seems to be immortal, like its Greek God namesake. In December it was reported that a new 64bit version of this banking focused credentia...
https://blog.comodo.com/malware/zeus-banking-trojan-surfaces-again-and-again/
Reading Time: 1 minute Could a breach at a HVAC company specializing in supermarket refrigeration have led to the Target Data breach? Apparently so, according to mega retailer Target and Pennsylv...
https://blog.comodo.com/e-commerce/hvac-connection-to-target-data-breach-chilling/
Reading Time: 2 minutes Still perfect! Once again, Comodo Internet Security Premium (CIS) software earned another 100% protection score in the most recent evaluation period of AV-Test.org. Como...
Reading Time: 1 minute Open source software is great, especially the part about being able to use it without paying a license. The underlying source code is also made available for community deve...
Reading Time: 2 minutes This has to be a difficult time for the IT security pros at the nation’s banks. They have been the targets of cyber attacks by the Iranians and “hactivists” intent o...
https://blog.comodo.com/e-commerce/banking-malware-because-thats-where-the-money-is/
Reading Time: 1 minute There are some signs that the incredible growth of Facebook has peaked, but with over one billion subscribers it has become a target of opportunity for hackers and fraudste...
https://blog.comodo.com/malware/social-engineering-fake-messages-plague-facebook/
Reading Time: 2 minutes It’s often said “What’s old is new again”. The well-known ZeuS banking trojan is back again, but this time it is being spread as a 64 bit version. In fact, the 64b...
https://blog.comodo.com/e-commerce/zeus-banking-trojan-is-back-in-64-bit-now/
Reading Time: 2 minutes Something funny was going on at the Cracked Humor web site recently, and many site visitors were not amused.Recently, the humor website Cracked.com became was the unwittin...
https://blog.comodo.com/malware/not-so-funny-cracked-humor-site-serves-drive-by-malware/
Reading Time: 2 minutes GitHub, the web hosting and code repository firm, is focusing attention on the importance of strong passwords for Internet security. You may have noticed that more and mor...
https://blog.comodo.com/malware/github-attack-highlights-importance-of-strong-passwords/
Reading Time: 2 minutes The recent update to Comodo Internet Security (CIS) Premium 6.3.297838.2953 has turned CIS into the ultimate protection machine according to Matousec.com’s Proactive Sec...
Reading Time: 3 minutes Update: check the latest version of Comodo’s free mobile security app These are exciting times for Android smartphone users, with great new products and so many great ap...
https://blog.comodo.com/mobile-security/avoiding-malware-in-android-apps/
Reading Time: 2 minutes Besides using Comodo Internet Security, the best way to protect your computer is to keep up with all of the security updates for you operating system. The Windows OS is th...
https://blog.comodo.com/malware/apple-rolls-out-security-updates-for-os-x-mountain-lion-safari/
Reading Time: 2 minutes Criminals use the latest to technology for a very old-fashioned reason, to steal folk’s money. If they can obtain your personal information, most significantly your logi...
https://blog.comodo.com/malware/hand-of-the-thief-trojan-can-it-pick-your-pocket/
Reading Time: 2 minutes RAT is a common term in the malware community, which refers to the Remote Access Trojans. As the name suggests, they are trojan viruses capable of infecting a compute but ...
https://blog.comodo.com/malware/njrat-is-a-mobile-trojan-threatening-internet-security/
Reading Time: 3 minutes Update: check the latest version of Comodo’s free mobile security app Online ad networks are reliable communication mediums that reach a mass audience and support qualit...
Reading Time: 2 minutes “Comodo’s rise is almost meteoric”. That’s what Neil Rubenking, PC Magazine Lead Security Analyst, wrote about Comodo Internet Security 6 when examining the result...
https://blog.comodo.com/comodo-news/av-test-june-results-comodo-is-perfect-protection-for-windows-7/
Reading Time: 1 minute Until recently, it has been conventional wisdom that the operating systems for mobile devices are much safer than for desktop and server computers and do not require the sa...
https://blog.comodo.com/comodo-news/comodo-technical-report-android-obad-trojan-virus-2/
Reading Time: 4 minutes Electronic money (e-money) is being used more and more often by people to make online purchases. And sure as night follows day, this means electronic money is also gaining...
https://blog.comodo.com/e-commerce/malware-using-your-computer-to-make-digital-money/
Reading Time: 4 minutes If you need to deliver or store confidential documents over the Internet, then placing them inside a password-protected, self-extracting ‘archive’ is one of the best w...
https://blog.comodo.com/malware/malware-detection-by-antivirus-scanners/
Reading Time: 5 minutes As part of Comodo Labs’ ongoing analysis of “Digital Signature” (confirming software author and guaranteeing computer program code hasn’t been altered or corrupted...
https://blog.comodo.com/malware/trojware-win32-trojanspy-volisk-a/
Reading Time: 2 minutes Another day, another innovative product from the security experts from Comodo. This time, it is free tool for protecting web sites from malware and blacklists. Comodo, tod...
Reading Time: 3 minutes By late May, 2000 it was common. In the suburbs that circle Manhattan and the villages surrounding Paris. In Tokyo, Toronto and Topeka. And Melbourne, Moscow and Mumbai. I...
https://blog.comodo.com/malware/outwitting-evil-in-the-age-of-sophisticated-cyber-criminality/
Reading Time: 1 minute Cybercriminals are doing their research and are aware of what’s popular, and what’s insecure. They are becoming more savvy and attacks are becoming increasingly more se...
https://blog.comodo.com/malware/spam-hit-a-two-year-low-but-malware-is-at-an-all-time-high/
Reading Time: 2 minutes excerpt from the article "Cyber Thieves" from the Sep 2010 issue of Reader's Digest. www.rd-india.com. Compiled by Srikanth The post Dialing for Dollars (With a ring of ...
Reading Time: 1 minute Some of us get so frustrated with our computers that we either hand them over to repair services or haul them out to the trash. Why? Because, “That computer has frozen, f...
Reading Time: 1 minute The amount of malware not detected by most PC Security software is increasing. This represents a heightened risk for Internet users. In March 2010, VirusTotal.com, a servic...
https://blog.comodo.com/malware/malicious-threats-present-a-growing-risk-for-internet-users/
Reading Time: 1 minute Most of the people we recently spoke to on the streets of New York didn’t know that around 50,000 new malware are created daily. We concluded that most people just don’...
https://blog.comodo.com/malware/50000-malware-created-daily/
Reading Time: 1 minute I recently read something interesting about a new malware. It’s a Trojan that’s been found to add a functionality known as “Spy Eye.” Analytical reports reveal that...