Reading Time: 3 minutesUS politician and Texas Representative Michael C.Burgess has voiced a very strong opinion regarding the issue of malware attacks when...
Reading Time: 2 minutesThe model is familiar:
Software developers work tirelessly to improve their product, releasing new versions to add new features or fix...
Reading Time: 5 minutesSince 2013, the CryptoLocker malware has been making its way across the Internet in various forms, in various iterations. CryptoLocker...
Reading Time: 1 minuteCryptoWall, the ransomware Trojan, is spread by spam emails, malware already on your computer, or drive-by downloads.
Here’s how it works:
1....
Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app
Many people believe that mobile phones are immune from the...
Reading Time: 2 minutesRansomware is quickly becoming the scourge of the Internet and Cisco Systems is reporting that several very popular web sites...
Reading Time: 4 minutesWhile other security companies and their users are still struggling to deal with the infamous ransomware Cryptolocker, we have no...
CryptoLocker, first spotted in September, continues to claim victims of both consumers and businesses alike. The Trojan is a form of ransomware that...