Reading Time: 2 minutesFantom, a new ransomware discovered recently, strikes disguised as a legitimate Microsoft Windows update. Thus it tricks users into downloading...
Reading Time: 2 minutesDDoS attacks (Distributed Denial of Service attacks) and the data breaches that accompany such attacks are of serious consequence; these...
Reading Time: 3 minutesSamsung Pay reportedly has security flaws, as serious as POS security flaws, that could help hackers skim credit cards wirelessly...
Reading Time: 2 minutesThe latest malware to hit Mac operating systems is the EasyDoc Converter. Cyber security experts have discovered this dangerous Mac...
The tragic combination of inevitable bugs and immutable codeLast week witnessed a catastrophic event in the Ethereum ecosystem, when The DAO, a smart...
Reading Time: 3 minutesUS politician and Texas Representative Michael C.Burgess has voiced a very strong opinion regarding the issue of malware attacks when...
Where shared ledgers add real value in enterprise IT
Almost a year after first releasing MultiChain, we’ve learnt a huge amount about how blockchains, in...
Reading Time: 3 minutesToday, Comodo announced availability of its next version of its free Comodo IT management platform, Comodo One MSP version 3.1.
Comodo...