Reading Time: 3 minutes
In a rather new trend, cybercriminals have begun to spread malware by spoofing printers and scanners.
These types of attacks started...
Reading Time: 5 minutesIn the first few weeks of 2018, cybercriminals targeted five universities, 23 private companies and several government organizations. Despite the...
Reading Time: 3 minutesEvery component of an operating system adds new functionality, and at the same time, creates potential openings for new forms...
Reading Time: 10 minutesComodo One. Configuring C1 Portal C1 MSP/Enterprise version comparison
C1 is the integrated platform for Managed Service Providers and Enterprises:
MSP is...
Reading Time: 6 minutesTakeover remote endpoints using ITSM
ITSM’s ‘Takeover’ feature allows administrators to remotely access and control Windows devices to solve issues, install...
Reading Time: 2 minutesDDoS attacks (Distributed Denial of Service attacks) and the data breaches that accompany such attacks are of serious consequence; these...
Where shared ledgers add real value in enterprise IT
Almost a year after first releasing MultiChain, we’ve learnt a huge amount about how blockchains, in...
Translating your website is a first step towards expanding into international markets. But once you get those customers from different countries, then what?Expectations...
Four key differences between blockchains and regular databasesIf you’ve been reading my previous posts, you will know by now that blockchains are simply...
Reading Time: 4 minutesThe security engineers and IT experts from the Comodo Threat Research Labs are constantly analyzing the thousands of malware families...
Reading Time: 3 minutesThe security engineers and IT experts from the Comodo Labs are constantly analyzing the thousands of malware families that are...