Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app
The use of BitCoin, digital currency that is not backed...
Reading Time: 2 minutesEvery computer, laptop, tablet and mobile phone connected to your network represents a vulnerable endpoint for viruses, worms, spyware, rootkits,...
Reading Time: 2 minutesAccording to the noted National Security expert Bill Gertz, White House computers have been compromised by hackers, probably from China,...
Reading Time: 6 minutesFollowing the incident on March 15, Comodo introduced additional methods and controls immediately against this new threat vector. On March...
Reading Time: 3 minutesHaving identified what happened, the next step we must take is to re-evaluate our threat model.Internet security is much harder...
Reading Time: 1 minuteThe Internet is rapidly becoming the world’s No.1 communications medium. Literally hundreds of millions of people are on the Web...
Sophos has released its annual 2024 Sophos Threat Report, with this year’s report detailing ‘Cybercrime on Main Street’ and the biggest threats facing small-...