You searched for Comodo | Page 2 of 10 | SC Media

Your search for Comodo returned 91 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Your search for Comodo returned 91 results

Sort Results:

Relevant Recent
Nearly 70 percent of IT pros target of weekly phishing attacks, HP finds

SWIFT Grift: Fake financial messaging service emails deliver Adwind RAT

An email phishing campaign launched this month attempted to infect spam recipients with the Adwind cross-platform RAT by fooling them into thinking they received an important financial document from the SWIFT financial messaging system. According to a Feb. 21 blog post from Comodo Group’s Threat Research Lab, the spam messages falsely alerted recipients to a…
Email Security

New Phishing scam combines FedEx and Google Drive to lure victims

Several universities and more than 20 companies have been hit with malware whose creators are using several layers of subterfuge to camouflage their phishing attack by taking advantage of a few trusted brand names. The new scam was uncovered by Comodo and eventually leads to an info stealer malware being installed. So far it has…
Security News

SC Awards Finalists 2018

1. Best Cloud Computing Security Solution Akamai Technologies for Enterprise Application Access Cisco Umbrella Darktrace Enterprise Immune System Enveil Juniper Networks for Sky Advanced Threat Prevention SendSafely for Dropzone STASH America for STASH Data Security  2. Best Computer Forensic Solution AccessData for Forensic ToolKit D3 Security for D3 Digital Forensics Case Management System  Guidance Software…

Industry Innovators 2017 – Access Control

Each year we opine that the nature of access control has changed and evolved. Well, not to sound like a broken record, but we must say that again this year. Part of the reason that we are seeing these changes is the same reason we are seeing changes in the Perimeter Defense category: the dissolution…

Fake Symantec site spreads OSX.Proton password stealer

A security researcher using the Twitter handle @noarfromspace last week spotted a fake Symantec blog spreading a new variant of the OSX.Proton password stealer. The malware family has been circulating for a while since its initial appearance in March 2017 and has since been distributed via a compromised Handbrake application and a similar compromise of…
Data Breach

No accounting for this: Deloitte’s email server reportedly breached

The email system of accounting giant and professional services firm Deloitte was breached last year, giving unknown actors access to some of its clients’ sensitive communications, data, and internal documentation. That the New York-based company is considered among the premier firms specializing in cybersecurity consulting makes the breach all the more embarrassing and perhaps damaging…
Locky Ransomware

Locky makes a strong comeback, propelled by botnet-fuel spam campaign

Reports have been pouring in this month about the sudden return of Locky ransomware, which had been largely dormant in 2017. In short order, researchers have discovered two new major versions of Locky being distributed via voluminous malspam campaigns. The first variant to emerge is a version called Diablo6, named after the .diablo6 file extension…
Product Review

Comodo Advanced Endpoint Protection

Comodo Advanced Endpoint Protection provides a wealth of functionality, including auto-containment, whitelisting, host intrusion prevention, firewall, web filtering, file reputation, behavior analysis, anti-malware, cloud-based sandboxing, device control, jailing protection and DLP.
Next hm-product-review in Endpoint Security