Reading Time: 1 minuteCryptolocker, the ransomware Trojan, works like this:
1. Reads a file2. Encrypts that file3. Overwrites original file with encrypted file4. Demands...
Reading Time: 2 minutesPhishing scams are continuing to plague Twitter users, now through the platform’s Direct Message (DM) feature.
As many people know, with...
Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app
Android users throughout North American are being text message...
Reading Time: 2 minutesAn SSL/TLS vulnerability has been identified that attackers could use to downgrade the cryptography of HTTPS connections to one vulnerable...
Reading Time: 2 minutesThe National Security Agency (NSA)’s Information Assurance Directorate has released a report on “Defensive Best Practices for Destructive Malware”. The...
Reading Time: 2 minutesNatural Grocers, a Colorado based health food chain that operates in 13 state. is investigating a breach impacting customer payment...
Reading Time: 1 minuteUpdate: check the latest version of Comodo’s free mobile security app
During January 2015 AV-Test Labs, the prestigious independent testing...
Reading Time: 2 minutesHealth related information is very personal, which makes it prized by businesses and by cyber criminals.
A study conducted by Timothy...