The Wayback Machine - https://web.archive.org/web/20140810225823/https://blogs.comodo.com/2014/01/
filezilla fake

Beware of Fake Filezilla!

Open source software is great, especially the part about being able to use it without paying a license. The underlying source code is also made available for community development. Unfortunately, hackers can take advantage of it to make fake copies of popular software. This...

success-small

Case Study: Combating Zero Day threats

Jean had a problem, she was managing over 200 endpoints and had no visual way to distinguish what devices were compliant, or even worse, had malware. To complicate matters, her current endpoint manager used antiquated black listing technology that left her vulnerable to zero...

cryptolocker - small

CryptoLocker 2.0 – Are You Ready? We Are

While other security companies and their users are still struggling to deal with the infamous ransomware Cryptolocker, we have no worries at Comodo.  In fact, if you use our Comodo Endpoint Security, with our unique Auto-Sandbox technology, you are already safe and secure fr...

high class shoppers - small

Neiman Marcus Breach: Should Not Be Overshadowed By Target Breach

The recent data breach at the luxury specialty retailer Neiman Marcus has been overshadowed the mega data breach agt the retailing giant Target. However, it is nothing to sneeze at. With 1.1 million debit and credit cards compromised the consequences many be huge. While this...

fetco-home-decor

Case Study: Fetco Home Decor Calls Comodo for Help

We really thought we were protected by our existing AV and managed email service. This virus was a drain on our resources. The experts from Comodo and our MSP got us fixed and provided a real approach for security. We will no longer take for granted that all solutions are cr...

man in datacenter

Data Security: Protecting Your Most Precious Asset

In the late 80′s and 90′s, most of the projects I was involved with were about converting paper based systems to computer entry, mostly PCs. In those days, it was very easy for a project to show results. Even a poorly designed system could easily show dramatic pr...

default_800x600_windows_xp_wallpaper-small

Windows XP Users: Comodo Has Your Back!

April 8th, 2014 is D-Day for Windows XP users everywhere. That’s when Microsoft is going to end support for its venerable operating system, first launched way back in 2001. Users of XP have been remarkably slow to upgrade to newer versions of Windows, creating an odd situati...

COMODO_MOBILE_SMALL

Comodo Mobile Security 2.4: Setting the Standard for Mobile Security

Mobile device security, long neglected by device makers, Internet software makers and end users, is increasingly becoming a high priority. Mobile is the direction of computing these days, and hackers are approaching the popular mobile platforms as targets of opportunity. Com...

google plus hack

Google+ Hacked: Local Hotel Listings Hijacked

There are two things I‘ve learned for sure from studying internet security issues: Anyone can be hacked and hackers always have something new up their devious sleeves. The news that Google+ has been breached is a case in point. Yesterday, the blog site searchengine.com repor...

free_credit_card_vector_small

Target Data Breach: Much Worse Than We First Knew

The Target data breach is a story that is not going to go away anytime soon. When Target first reported the breach of its Point of Sale System and credit card data last month, it was the largest reported data breach of the year and one of the most significant in history. Acc...

Page 1 of 212