Reading Time: 5 minutesIn late November 2016, Comodo Threat Research Labs discovered samples of the Android malware “Tordow v2.0” affecting clients in Russia....
Reading Time: 6 minutesTakeover remote endpoints using ITSM
ITSM’s ‘Takeover’ feature allows administrators to remotely access and control Windows devices to solve issues, install...
Reading Time: 3 minutesCyber criminals have resorted to another sophisticated way of infecting user systems with ransomware and other malware. Malvertising or compromised...
Reading Time: 3 minutesComodo Threat Research Labs (CTRL) has announced that it has detected a new family of financial malware dubbed as “Gugi/Fanta/Lime”....
Quite possibly, one of the most useful inventions of modern times, and since the advent of sliced bread has to be online fundraising. Companies like Crowdfunding and Kickstarter enable you to get your product in front of millions immediately. What was once a daunting task...
The content of this article has been adapted from Equity Crowdfunding: The Complete Guide For Startups And Growing Companies, launching on Amazon on...
Reading Time: 2 minutesUsing hacked “Internet of Things” (IoT) devices, cyber criminals had launched a massive internet attack on the Internet infrastructure company...