Zephyrnet Logo

Tag: ransomware

The Buzz on Comodo 360

Reading Time: 2 minutesAll the buzz out of RSA was about how cyber security companies can differentiate themselves in a crowded...

The World Will Be Talking Security at RSA 2016 This Week – And Comodo Will Be Leading The Conversation

Reading Time: 2 minutesThis week, the best and brightest from the growing security industry landscape will gather in San Francisco for the annual...

Ransomware attacks are on the rise – Comodo can help protect you from them

Reading Time: 2 minutesFinancial services organization, banks, retail outlets and now hospitals and medical centers.  No industry seems to be safe from the...

FROM THE COMODO LABS: Comodo Containment vs. Zeus/MitB

Reading Time: 4 minutesThe security engineers and IT experts from the Comodo Threat Research Labs are constantly analyzing the thousands of malware families...

FROM THE COMODO LABS: What’s old is new again, as that e-fax could contain CryptoLocker

Reading Time: 5 minutesSince 2013, the CryptoLocker malware has been making its way across the Internet in various forms, in various iterations. CryptoLocker...

The Ransomware Challenge: Back Up Your Clients’ Data Now!

Reading Time: 2 minutesNew, stronger forms of ransomware, such as Critoni and Cryptowall, are on the loose, reading hard and removable drives, then...

CryptoWall vs Comodo Containment

Reading Time: 1 minuteCryptoWall, the ransomware Trojan, is spread by spam emails, malware already on your computer, or drive-by downloads. Here’s how it works: 1....

From The Comodo Think Tank: Cryptolocker, SpyEye and Shylock Malware are No Match for Comodo Containment Technology

Reading Time: 3 minutesOver the past few weeks, the engineers from the Comodo Think Tank have looked at some of the most feared...

Cryptolocker vs Comodo’s Containment

Reading Time: 1 minuteCryptolocker, the ransomware Trojan, works like this: 1. Reads a file2. Encrypts that file3. Overwrites original file with encrypted file4. Demands...

ADVISORY: POODLE Threat Requires Immediate Attention

Reading Time: 3 minutesThis has been a rough year in Internet Security. There has been a deluge of data breaches, especially against Point-of-Sale...

Mobile Phones Under Attack by Ransomware

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Many people believe that mobile phones are immune from the...

Cisco: Popular Sites Spreading Ransomware via Mavlertising

Reading Time: 2 minutesRansomware is quickly becoming the scourge of the Internet and Cisco Systems is reporting that several very popular web sites...

Latest Intelligence

spot_img
spot_img