Reading Time: 3 minutesComodo Threat Research Labs (CTRL) has announced that it has detected a new family of financial malware dubbed as “Gugi/Fanta/Lime”....
Reading Time: 4 minutesThe security engineers and IT experts from the Comodo Threat Research Labs are constantly analyzing the thousands of malware families...
Reading Time: 5 minutesSince 2013, the CryptoLocker malware has been making its way across the Internet in various forms, in various iterations. CryptoLocker...
Reading Time: 3 minutesThe Comodo Antispam Labs (CASL) team has identified a malware attack targeted specifically at businesses and consumers who may use...
Reading Time: 1 minuteCryptoWall, the ransomware Trojan, is spread by spam emails, malware already on your computer, or drive-by downloads.
Here’s how it works:
1....
Reading Time: 1 minuteCryptolocker, the ransomware Trojan, works like this:
1. Reads a file2. Encrypts that file3. Overwrites original file with encrypted file4. Demands...
Reading Time: 2 minutesA Personal Firewall controls network communication in and out of a single user’s computer and will restrict the communication based...