Zephyrnet Logo

Tag: Ransom

Michael C.Burgess Says Ransomware Criminals Should Be “Shot at Sunrise”

Reading Time: 3 minutesUS politician and Texas Representative Michael C.Burgess has voiced a very strong opinion regarding the issue of malware attacks when...

Why Are Ransomware Attacks Occurring with Increasing Frequency?

Reading Time: 3 minutesWe are starting to see it more and more: ransomware attacks are on the rise – and we’ve been seeing...

New TeslaCrypt Ransomware is Extremely Dangerous – Unless You’re Protected by Comodo

Reading Time: 2 minutesThe model is familiar: Software developers work tirelessly to improve their product, releasing new versions to add new features or fix...

FROM THE COMODO LABS: What’s old is new again, as that e-fax could contain CryptoLocker

Reading Time: 5 minutesSince 2013, the CryptoLocker malware has been making its way across the Internet in various forms, in various iterations. CryptoLocker...

The Ransomware Challenge: Back Up Your Clients’ Data Now!

Reading Time: 2 minutesNew, stronger forms of ransomware, such as Critoni and Cryptowall, are on the loose, reading hard and removable drives, then...

CryptoWall vs Comodo Containment

Reading Time: 1 minuteCryptoWall, the ransomware Trojan, is spread by spam emails, malware already on your computer, or drive-by downloads. Here’s how it works: 1....

From The Comodo Think Tank: Cryptolocker, SpyEye and Shylock Malware are No Match for Comodo Containment Technology

Reading Time: 3 minutesOver the past few weeks, the engineers from the Comodo Think Tank have looked at some of the most feared...

Mobile Phones Under Attack by Ransomware

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Many people believe that mobile phones are immune from the...

Cisco: Popular Sites Spreading Ransomware via Mavlertising

Reading Time: 2 minutesRansomware is quickly becoming the scourge of the Internet and Cisco Systems is reporting that several very popular web sites...

CryptoLocker 2.0 – Are You Ready? We Are

Reading Time: 4 minutesWhile other security companies and their users are still struggling to deal with the infamous ransomware Cryptolocker, we have no...

Block CryptoLocker Before It Installs with Comodo Endpoint Security

CryptoLocker, first spotted in September, continues to claim victims of both consumers and businesses alike. The Trojan is a form of ransomware that...

CryptoLocker Virus – Best Practices to Ensure 100% Immunity

Reading Time: 5 minutesYou may have heard of the latest virus, CryptoLocker, by now. The virus is a form of ransomware, a class...

Latest Intelligence

spot_img
spot_img