Zephyrnet Logo

Tag: records

Blockchain use cases proliferate, but to whose benefit not yet clear

When Brian Behlendorf learned that blockchain technology was being applied to a land registry project in Honduras,... the proverbial lightbulb went on. Land...

Comodo Dome Shield: Gateway Protection against Web-Borne Threats Now Available at No Charge

Reading Time: 3 minutesThe web is the #1 vector for a wide variety of threats—from garden variety malware, to phishing attacks, ransomware, and...

Comodo One. Understanding Devices in ITSM

Reading Time: 25 minutesComodo One. Understanding Devices in ITSM How to implement “Bulk to installation package” in devices? Step 1: Click ‘Download Bulk Enrolment Package’...

Lack of Basic HTTPS Leads to Major Data Breach at Clash of Kings Forum

Reading Time: 2 minutesClash of Kings is a very popular mobile game with millions of avid players being members of its official forum....

Comodo Updates Free Managed Services Solution

Reading Time: 3 minutesToday, Comodo announced availability of its next version of its free Comodo IT management platform, Comodo One MSP version 3.1. Comodo...

Using Technology to Help Secure and Protect Non-Profits Across the United States: Comodo and TechSoup

Reading Time: 2 minutesOur philosophy at Comodo is that every single technology transaction needs to have a layer of trust and security built...

Why Are Ransomware Attacks Occurring with Increasing Frequency?

Reading Time: 3 minutesWe are starting to see it more and more: ransomware attacks are on the rise – and we’ve been seeing...

FROM THE COMODO LABS: Cybercriminals target citizens with a phishing email in London Borough of Richmond upon Thames in the UK

Reading Time: 2 minutesThe Comodo Antispam Labs (CASL) team has identified a new regional phishing threat, targeted specifically at the citizens of the...

FROM THE COMODO LABS: New Malware Attack Targets UK Mail Customers

Reading Time: 3 minutesThe Comodo Antispam Labs (CASL) team has identified a malware attack targeted specifically at businesses and consumers who may use...

Smart contracts: The good, the bad and the lazy

Why private blockchains should not be eager to run codeI’m not a fan of the term “smart contracts”. For a start, it has been used...

Comodo in the News: How Comodo Endpoint Security Customer Mid-South Steel Keeps Malware in Check

Reading Time: 2 minutes In a new article in Baseline Magazine, Comodo endpoint security customer Mid-South Steel talks about the challenges the company had...

Boost Your MSP Revenue by Becoming an MSSP

Reading Time: 3 minutesYou work in IT services, so you are well aware that the demand for security, especially among small- and mid-sized...

Latest Intelligence

spot_img
spot_img