Latest Comodo Antivirus Updates

Comodo Internet Security 8: The Best Gets Better

You know you deserve the very best in life, but your wallet probably isn’t big enough to afford a lot of the the best things you would like. The very best house, best car or the best vacation are all…

Virus Protection

IoT Malware that Wipes Data from Infected Devices

Security experts and researchers have recently observed certain malware attacks targeting IoT devices that lead to the wiping of data from the infected systems/devices. Based on a couple of attacks that happened recently, it’s inferred that hackers are adding data-wiping…

Virus Protection

Discussing Six Most Critical Application Security Risks

Here’s a look at the six most critical application security risks that anyone could encounter today, in the age of aggressive cyber threats, malware attacks, virus protection tool etc… Let’s begin with security configuration related issues… Well, this is important,…

Mac Antivirus

New Macro-Based Malware Attacks Windows and MacOS systems

A new form of Microsoft Word macro-based malware has been discovered by cyber security researchers. This malware can affect both Windows and MacOS systems but follows different methods of attack for each operating system. The malicious macro is built-up on…

Antivirus

A New Attack That Turns Antivirus Software Into Malware

Here comes news about a new kind of attack that can turn an advanced antivirus security software itself into malware. Researchers have come up with reports about a new proof-of-concept exploit, which has been named DoubleAgent, which would hijack third-party…

Antispam

How to Tackle Phishing Emails and Other Malicious Email Attacks

We have had, in the recent months, many reports of malicious email attacks, including those targeting Amazon and Netflix customers. Such malicious email attacks are on the rise; still it seems that even today there are many people, and many…

Virus Protection

Increasing Fileless Malware Attacks

Nowadays, cybercriminals seem to prefer Fileless Malware Attacks on organizations. Most malware attacks can be detected, blocked and removed using malware removal tools or applications. However, Fileless Malware Attacks are non-malware attacks that utilize legitimate existing programs and applications and…

Internet Security

Top Seven Internet Security Suites for 2017

For any business today, security should be a top priority, always. Utmost importance needs to be given to planning a thorough cybersecurity strategy. Having a good antivirus deployed, having a really dependable internet security suite is critical in this regard.…

Antivirus

GOOGLE – Declares Microsoft Vulnerability in Public

GOOGLE has found that the Windows 10 Edge and Internet Explorer 11 has now been exposed to a severe security vulnerability that aids the hackers to strike the browsers while they can execute malware code from remote and gain access…

Smart home security

5 Ways to Protect Smart Homes

Modern homes adorned with TVs, refrigerators and other electronic gadgets are now susceptible to hackers’attack. Americans find their homes have already been hacked and there is an exponential rise of such cyber attacks giving jitters amidst the home owners. Gone…

Internet Security

5 Tips to increase the security of your computer

Computer security, we all know, is of paramount importance these days, whether it be a personal computer, used solely for personal purposes or one used for official or business purposes. Every computer needs to be kept secure, especially since much…

Page 1 of 1412345...10...Last »