COMODO INTERNET SECURITY 10 NOW AVAILABLE FOR DOWNLOAD
Comodo released a new version of Internet Security. Read the article to find out the new and improved features.
Comodo: Cloud Native Cyber Security Platform
Comodo released a new version of Internet Security. Read the article to find out the new and improved features.
End users can look for applications using EV Code Signing Certificates from Comodo in order to feel safe and trust the application
In addition to the huge threat banking Trojans already pose to financial firms, cybercriminals are now attaching file-encrypting ransomware programs to create a new level of danger for mobile users.
Read why Comodo was included in PC Mag’s review on best security suites of 2017.
Read the whitepaper about how players in the cybersecurity industry claiming they’ve come up with the elusive magic bullet to stop malware and breaches but clearly, it isn’t effective.
This paper is the direct result of a simple question that a customer asked us recently: “What if a malicious file were to escape Comodo’s containment technology, wouldn’t it be ‘game over’?”
Read Comodo’s research and analysis on another mobile banking trojan called Tordow 2.0 that has the ability to encrypt files
According to Softpedia, the new Tordow, spotted by Comodo in Russia, has the potential to become a worldwide threat. Read the article to find out why.
Comodo Threat Research Labs have identified a new malware Tordow v2.0 which is the first mobile banking Trojan created specifically for Android devices affecting users in Russia.
Read Comodo’s commentary on an updated variant of the Tordow Android malware featuring additional data collection capabilities and ransomware-like behavior.
Read Infosecurity Magazine article about Comodo John Peterson insights on Vera Bradley payment card data breach
Read Kenneth Geers, Comodo’s senior research scientist, commentary on assessing the threat of Russia hacking the US election.
Read New York Times article about Kenneth Geers analysis on Russia’s cyber attacks
Read Fast Company article about John Peterson insights on Yahoo breach.
Read CIO’s review about Comodo
Read Network World’s review about Comodo
Read Investor’s Business Daily article about Kenneth Geers’ analysis of the Ukrainian conflict.
Read SC Magazine article to find out why NATO cyber defense ambassador reflects on cyberwarfare’s ethics.
Read The Guardian article on why Cyberwar is already in the US.
Read The Register story on why cyberspace has been declared the world’s most powerful military alliance.
Read Investor’s Business Daily article on Dr. Kenneth Geers’ discussion on why cyberwar exists and why it is on the rise.
Read Small Business Computing article to find out more about SSL certificates.
Read the Infosecurity story about a new malware campaign that targets Amazon users. The Comodo Labs team found the malware.
Read eSecurity Planet story on the Linkedin Breach, which included commentary from Comodo John Peterson on why companies of different sizes need endpoint security, breach detection and secure gateway.
Read Tech News World story which includes Comodo’s Daniel Korsunsky take on why the gang behind TeslaCrypt ransomware surrendered the decryption key for free.
Read Beta News story on the LinkedIn password leak and Comodo’s John Peterson offers key perspective on cybersecurity issues related to the IT environment.
Read Credit Union Times story and see what Comodo’s John Peterson has to say on delay breach notifications.
Read Credit Union Times feature story on the latest email breaches targeting financial institutions, manufacturing and retail companies. Comodo John Peterson offers his perspective on advance endpoint protection and why companies of all sizes are at risk for cyberattack.
A thought leadership article by Comodo’s John Peterson was published in IT Pro Portal on the next generation approach for Advanced Persistent Threats.
Channelnomics.com highlighted Comodo’s latest updates to the Comodo One MSP platform
A thought leadership article by Comodo’s Dr. Phillip Hallam-Baker was published in IoT Innovator on why cybersecurity is important in the age of the Internet of Things.
Read the SHRM.org story on security issues related to thumb drives, and what Comodo’s Robin Alden has to say about the cybersecurity issues that come with those drives.
CUTimes.com has a feature story on one of the latest Trojans hitting financial services organizations. Comodo’s John Peterson offers his perspective on advanced endpoint protection and why banks and financial services organizations are at risk for cyberattack.
Byline article by Comodo on the science behind ransomware.
Read the Beta News feature story which talks about business and consumer security advice to stay clear of phishing attacks for the forthcoming U.S. tax day deadline.
Softpedia runs a feature story on the hacking of US agencies and Comodo’s John Peterson offers key perspective on security trends and tips on how to protect an IT environment.
Read the ISMG News feature story on the Trump data breach, where Comodo’s Zach Forsyth offers his perspective on why the hospitality industry overall has become a main target for cybercriminals. The story appeared across the ISMG family of sites including Data Breach Today.com, Bank Info Security.com, CU Info Security.com, Info Risk Today.com, and Gov …
ISMG NEWS: TRUMP HOTELS BREACHED AGAIN (COMMENTARY BY COMODO INCLUDED) Read More »
Read the Infosecurity Magazine story about Trump Hotels being hacked again and why Comodo’s Zach Forsyth thinks industries like hospitality and hotels remain an ideal target for cybercriminals.
Read the Softpedia.com story where Comodo’s Zach Forsyth is featured talking about why the hospitality industry is a key target of the cybercriminal, and why current technologies many have in place are not working
Read the eSecurity Planet story which covers the latest phishing attack, this time targeted at trying to steal W-2 forms. Why are phishing attacks getting more and more frequent? Director of the Comodo Threat Research Labs Fatih Orhan offers his perspective.
Read the CSO Magazine slide show on what security pros (including Comodo’s own John Peterson) have to say when dealing with today’s network security and kids interacting with technology.
CNN Money highlights the recent ransomware attacks that are targeting hospitals and included commentary from Comodo’s Zach Forsyth, who offers his take on why these hospitals might be prime targets of the cybercriminal today.
Read the SC Magazine story on a phishing scam identified by the Comodo Threat Research Labs, designed to spread malware to customers who use FedEx, a campaign that was targeted in both English and Italian
Read the Fierce IT Security story on a new phishing campaign that the Comodo Threat Research Labs team discovered, this time trying to target FedEx customers in both English and Italian
Read the Network World feature story on how Comodo’s default deny platform approach solves the malware problem
Read the ChannelPro story on how to combat insider security threats, which included commentary from Comodo’s Fatih Orhan on the issue of applying security policies and procedures to help ensure a protected infrastructure.
Read the Softpedia.com story on one of the latest breaches, and how Comodo Vice President of Enterprise Business Development Paul Jespersen thinks cybercriminals pick some of their targets.
Read the SC Magazine story on the latest healthcare breach and why Comodo Vice President of Enterprise Business Development Paul Jespersen thinks hospitals and banks may continue to be ideal targets for cybercriminals.
Read The Hosting News.com story on Comodo launching a new secure web platform, with Comodo Vice president of Enterprise Products John Peterson quoted.
How to combat and recover from advance persistent threats is covered in the new byline piece by Comodo Vice President of Enterprise Products John Peterson in Canadian Security magazine.
Read the Fierce IT Security story on a new phishing attacks that targeted W-2 forms being delivered to cybercriminals. Director of Comodo Threat Research Labs Fatih Orhan was quoted in this article offering his perspective on phishing trends at large.
Watch the Data Breach Today video with Comodo Vice President of Enterprise Products and Product Marketing John Peterson, on how Comodo360 technology has solved specialized threats.
Network World highlighted Comodo Advanced Endpoint Protection as one of the hottest cybersecurity products present at RSA Conference 2016.
Read the Beta News.com feature story on Comodo’s launch of Comodo Dome, a new cloud delivered secure web platform serves as a checkpoint across all incoming and outgoing traffic on a network.
Read the ZDNet story on Comodo Labs new discovery about a phishing campaign that targeted business and consumer customers of ICICI Bank.
Listen to the InfoRisk Today podcast with Comodo’s John Peterson, on how Comodo technology has solved the malware problem
View the slide show on CIOInsight.com for 10 tips from Comodo on how to combat and recover from Advance Persistent Threats.
Read the Third Certainty story on Comodo’s research about the attacks happening on social media and cloud apps which exploit trust in popular free services. Comodo Director of Technology Fatih Orhan was quoted in this article.
Read the Softpedia.com article on a recent university data breach which caused 62,000 social security numbers to be exposed. Vice President of Enterprise Business Development Paul Jespersen offers his perspective on why breach targets like universities are so popular.
Read the IT Pro Portal story on the findings by the Comodo Threat Research Lab on the recent Facebook phishing campaign; where Comodo Director of Technology Fatih Orhan was also quoted.
Read InfoSecurity story on a new malware campaign that leverages the Facebook brand to target businesses and consumers. The malware was found by Comodo Director of Technology Fatih Orhan and the Comodo Labs team.
Read the InfoSecurity story on a CyrptoLocker ransomware being spread through an E-fax campaign, a malware that was detected by Comodo Director of Technology Fatih Orhan and the Comodo Threat Research Labs.
Read the Business Solutions article on 2016 advice for the world of small to mid-sized business in areas like technology and cybersecurity. Comodo Vice President of Enterprise Business Development & Emerging Products Paul Jespersen was quoted in this article.
Read the Help Net Security story on the findings by the Comodo Threat Research Lab on new phishing malware being sent, disguised as legitimate Facebook emails being leveraged in a phishing campaign.
Read the Beta News story, with commentary by Comodo’s Director of Technology Fatih Orhan, on the latest research by the Comodo Threat Research Lab.
SC Magazine story highlights the findings by the Comodo Threat Research Lab on the Nivdort trojan being found in new Facebook phishing campaign.
Read the Neowin article on Comodo Labs’ discovery on a new phishing email campaign targeting WhatsApp users. Comodo Director of Technology Fatih Orhan was quoted in this article.
Read the American City and County story on how the City of Danville leverages Comodo advanced endpoint protection technology to shield its IT system from malware.
Read the Tech Times article with commentary by Comodo’s Fatih Orhan about the Comodo Antispam Labs discovery on Whatsapp malware attacks.