Latest News

Financial Malware image

Comodo Detects New Family of Sophisticated Financial Malware

Comodo has detected a new family of financial malware dubbed as “Gugi/Fanta/Lime”. It is a sophisticated Banking Trojan that can bypass the standard security protocols of an Android operating system (version 6), and take over the operating system. This Trojan places an authentic looking counterfeit interface program layer over a genuine application such as the…

VCW Unsplash

Complete security from Malware Attacks

Comodo ONE IT and Security Manager brings all your endpoint management needs together. Product overlap and multiple management tools leave you with limited visibility and potential security gaps. Comodo ITSM brings all your IT management needs together into a unified platform that streamlines operations and reduces risk. Comodo’s IT and Security Manager allows for the…

vcw-unsplash-66

Would you like to help your clients look for vulnerabilities on their websites and web applications? – Appcheck

The reason that we are asking our partners this question is that over 70% of hacks/data breaches are through an exploited vulnerability within a website or web application. We partner with an industry leading Web application vulnerability scanning tool called Appcheck to help our partners with this problem. The vendor is offering FREE TRIALS which can…

Sign up for our next Cyberoam Certified & Network Professional (CCNSP) course and equip yourself with competent network security skills and certifications to help you get the most out of Cyberoam’s security features.

A recent Osterman Research survey conducted on behalf of Cyren found Phishing to be the top threat category for small- to medium- sized businesses (up to 3,000 employees), with 43% suffering a phishing breach in the last 12 months.

The reason for the dramatic rise in phishing is fairly obvious. Driven by a constant desire to maximise revenue, cybercriminals realize that phishing is a relatively inexpensive way to obtain sensitive, personal and financial information that can then be resold on the black market or used directly for monetary gain.