Do you use SWIFT financial messaging services? Millions of people around the world do. This system connects more than 11,000 banking and security organizations, market infrastructures and corporate customers in more than 200 countries and territories. Cybercriminals are using it too, but in special, devious ways. Recently, experts from Comodo Threat Research Lab discovered this […]
The post Comodo Threat Research Lab reveals new vicious trick appeared first on Comodo News and Internet Security Information.
With cybercrime costs projected to reach $2 trillion by next year according to Juniper Research, it’s clear that 2018 won’t spell the end of malware. But with the right strategy, tools, and knowledge, 2018 can spell the end of the malware problem for your company. Join NATO Cyber Centre Ambassador Dr. Kenneth Geers and Comodo […]
The post Webinar: Cyber Strategy 2018: Malware Problem Solved appeared first on Comodo News and Internet Security Information.
In a rather new trend, cybercriminals have begun to spread malware by spoofing printers and scanners.In a rather new trend, cybercriminals have begun to spread malware by spoofing printers and scanners. These types of attacks started making headlines in late November 2017, after security researchers at Barracuda Labs witnessed an attack in which cybercriminals spoofed […]
The post How to Protect Yourself from Printer/Scanner Malware appeared first on Comodo News and Internet Security Information.
Spamming is the act of sending unsolicited message via electronic messaging systems. Unsolicited or unwanted mails not only consume your corporate email bandwidth but can also negatively affect employee productivity. Therefore, enterprises need to keep the spamming problem in check. If not, spam can cause a lot of problems. What Does Anti-Spam Software Do? As […]
Cybercriminals always follow the money, and it’s no wonder that Bitcoin’s skyrocketing popularity has made it a massive target for malicious hackers. These criminals are stalking and hunting Bitcoin wallet owners in many devious ways, and one of the most popular tactics is phishing. If a hacker succeeds in gaining access to a target’s Bitcoin […]