Setting up Comodo One's RMM to effective safeguard ITSM

RSS Feed URL: https://blog.comodo.com/it-management/comodo-one-takeover-remote-endpoints-using-itsm/
Category: Internet | Total Views: 89

Latest entries from this feed

Cybercriminals turn Microsoft Excel into their accessory with a new trick to attack users

Posted on 11 July 2018 | 11:38 am by Comodo

Perpetrators go on inventing cunning techniques to attack users. One of the most popular tricks of infecting a computer is poisoned MS Office files with a malicious script inside. A new dangerous threat related to this kind of attack has newly appeared. Hackers use .IQY files to get a total remote access to a victim’s […]

The post Cybercriminals turn Microsoft Excel into their accessory with a new trick to attack users appeared first on Comodo News and Internet Security Information.



Related products