Latest Comodo Antivirus Updates

Comodo Internet Security 8: The Best Gets Better

You know you deserve the very best in life, but your wallet probably isn’t big enough to afford a lot of the the best things you would like. The very best house, best car or the best vacation are all…

What is What is Pharming

What is Pharming and How to Prevent These Attacks

The word Pharming is coined from the words “phishing” and “farming”. It refers to the cybercrime activities such as phishing, where a website’s traffic is hacked in order to steal the sensitive data. Basically, Pharming utilizes the sequence of letters…

Computer Worm

What is the Morris Worm?

The Morris worm was released on November 2nd, 1988 by Robert Tappan Morris. It was the first of computer worms to be distributed on the internet that would not work as planned. Origins As mentioned above, the worm was introduced…

cybercrime

What is Crimeware? How to Protect Yourself from Crimeware?

Crimeware is a set of programs or any computer program that has been designed to facilitate illegal activity online. Many spyware programs, keyloggers, and browser hijackers can be considered crimeware, although only those used illicitly. The phishing kit is one…

Virus Removal

How to Get Rid of Viruses From Your Devices?

Almost all the devices connected to the internet are vulnerable to malware infection as hackers find new ways and methods to attack and infest the PCs. Users should update the software with new security patches, install an advanced virus protection…

browser hijacker

What is Browser Hijacking? How to Get Rid of This Virus?

In computing, a browser hijacking refers to the malicious intrusions made by a hijacker for personal gains. In order to accomplish this, the hijacker uses a malicious software which is placed on the internet browser that alters the activity of…

Free Virus Checker

Why an Effective Virus Checker is Essential

With the influence of sophisticated technology high and low, hackers and other bad guys from the virtual underworld find ways to infect users’ computers. Most of us are not much concerned about performing an antivirus scan for viruses, as we…

what is macro virus?

What is Macro Virus and How to Prevent Them

What is Macro Virus A virus that adds its code to the macros associated with spreadsheets, documents, and other data files in a system is called as a macro virus. Any computer infected by macro virus needs an antivirus program…

trojan horse virus

What is Trojan Virus? How they work and methods to be protected?

Trojans or Trojan Horses is often mimicked as genuine software by malware authors to gain access to the target victim’s system. Most often the users are tricked by means of social engineering that loads and executes the trojans in the…

Linux Antivirus

The Need of Linux Antivirus

In the IT world, it is generally assumed that Linux is more secure compared to other operating systems. In the recent times, it is noticed that the targeted attacks on Linux based machines are on the rise. No wonder, the…

What is Identity Theft?

Know How To Prevent Identity Theft

Today the increasing number of cyber attacks are targeted on individuals and small size businesses. The attacks are aimed at robbing an individual’s identity which is referred to as the identity theft. Thus, a stolen information, such as driving license…

Page 1 of 3212345...102030...Last »