Generative Data Intelligence

Tag: Hide

How to Protect Yourself from Printer/Scanner Malware

Reading Time: 3 minutes In a rather new trend, cybercriminals have begun to spread malware by spoofing printers and scanners. These types of attacks started...

Comodo protects five universities from new malware that steals data

Reading Time: 5 minutesIn the first few weeks of 2018, cybercriminals targeted five universities, 23 private companies and several government organizations. Despite the...

Understanding and Mitigating Bashware and Similar Malware Threats

Reading Time: 3 minutesEvery component of an operating system adds new functionality, and at the same time, creates potential openings for new...

Understanding and Mitigating Bashware and Similar Threats

Reading Time: 3 minutesEvery component of an operating system adds new functionality, and at the same time, creates potential openings for new forms...

Comodo One. Configuring C1 Portal

Reading Time: 10 minutesComodo One. Configuring C1 Portal C1 MSP/Enterprise version comparison C1 is the integrated platform for Managed Service Providers and Enterprises: MSP is...

Comodo One. Takeover remote endpoints using ITSM

Reading Time: 6 minutesTakeover remote endpoints using ITSM ITSM’s ‘Takeover’ feature allows administrators to remotely access and control Windows devices to solve issues, install...

When DDoS Attacks, Botnets Play Mischief

Reading Time: 2 minutesDDoS attacks (Distributed Denial of Service attacks) and the data breaches that accompany such attacks are of serious consequence; these...

Four genuine blockchain use cases

Where shared ledgers add real value in enterprise IT Almost a year after first releasing MultiChain, we’ve learnt a huge amount about how blockchains, in...

How to deliver multilingual customer service on Zendesk in a few easy steps

Translating your website is a first step towards expanding into international markets. But once you get those customers from different countries, then what?Expectations...

Blockchains vs centralized databases

Four key differences between blockchains and regular databasesIf you’ve been reading my previous posts, you will know by now that blockchains are simply...

FROM THE COMODO LABS: Comodo Containment vs. Zeus/MitB

Reading Time: 4 minutesThe security engineers and IT experts from the Comodo Threat Research Labs are constantly analyzing the thousands of malware families...

FROM THE COMODO LABS: Comodo vs ZeroAccess

Reading Time: 3 minutesThe security engineers and IT experts from the Comodo Labs are constantly analyzing the thousands of malware families that are...

Latest Intelligence

spot_img
spot_img
spot_img