If you’re reading this in the original English it was written (rather than our translations in Chinese, German, French, Portuguese, Spanish or Italian), perhaps it’s not...
Reading Time: 3 minutesCybercriminals’ big hunt for users’ credentials is gaining momentum rapidly. Their strategy usually stays the same: get attention of the...
Not a week goes by without some new artificial-intelligence-powered product being marketed to marketers. For marketers wanting to gain an edge on the...
Reading Time: 3 minutes
In a rather new trend, cybercriminals have begun to spread malware by spoofing printers and scanners.
These types of attacks started...
The interest in Blockchain and distributed ledger technology (DLT)has exploded in recent years with a large focus on the financial industry. Meanwhile, medical...
Reading Time: 4 minutes
New Ransomware, Botnet Threat: IKARUSdilapidated Attack is August ’17 Locky Rebirth
A Special Update from the Comodo Threat Intelligence Lab
A new...
Reading Time: 36 minutesComodo One. Understanding Windows Profiles in ITSM
How to hide/show security client and communication client tray icons in devices?
Step 1: Go...
For shared immutable key-value and time series databasesToday we’re proud to release the latest version of MultiChain, which implements a crucial new set...
Where shared ledgers add real value in enterprise IT
Almost a year after first releasing MultiChain, we’ve learnt a huge amount about how blockchains, in...
Reading Time: 5 minutesSince 2013, the CryptoLocker malware has been making its way across the Internet in various forms, in various iterations. CryptoLocker...