Reading Time: 2 minutesThe model is familiar:
Software developers work tirelessly to improve their product, releasing new versions to add new features or fix...
Reading Time: 5 minutesSince 2013, the CryptoLocker malware has been making its way across the Internet in various forms, in various iterations. CryptoLocker...
Reading Time: 3 minutesThe Comodo Antispam Labs (CASL) team has identified a new malware attack targeted specifically at businesses and consumers who might...
Reading Time: 3 minutesThe Comodo Antispam Labs (CASL) team has identified a malware attack targeted specifically at businesses and consumers who may use...
Reading Time: 3 minutesThe IT services industry continues to shift from the old, reactive break-fix model to the proactive Managed Services (MSP) approach,...
Reading Time: 1 minuteSpyEye is a type of malware which Cybercriminals use to steal online banking credentials, credit card data, passwords, and other...
In Episode 2, Vasco talks with Silvia Oviedo Lopez, Pinterest’s Head of International Product & Operations.Localization is optional, but internationalization is not. The...