Reading Time: 2 minutesWannaCry, the ransomware that attacked networks in many leading healthcare organizations and other organizations across the globe on Friday, is...
When Brian Behlendorf learned that blockchain technology was being applied to a land registry project in Honduras,... the proverbial lightbulb went on. Land...
Reading Time: 9 minutesHere’s an A to Z glossary of terms related to Endpoint Protection-
A
Advanced Persistent Threat (APT) – An unauthorized person gaining...
Reading Time: 2 minutesThe latest news regarding Wikileaks documents from the CIA has caused quite an industry stir, and also caught Comodo’s attention...
Reading Time: 3 minutesWhy Is Computer Security So Hard?
On the Impossibility of Virus Detection
Professor Dave Evans teaches Computer Science at the University of...
Reading Time: 36 minutesComodo One. Understanding Windows Profiles in ITSM
How to hide/show security client and communication client tray icons in devices?
Step 1: Go...
1 – Self-Driving Cars: Feds Release Long-Awaited RulesOn Tuesday, the federal government released its long-anticipated new rules for self-driving cars. In a press release,...
Reading Time: 2 minutesDDoS attacks (Distributed Denial of Service attacks) and the data breaches that accompany such attacks are of serious consequence; these...