Google has recently made announcements to limit the access to its virus database website, VirusTotal, in an attempt to ostracise companies from the system who do not contribute to the website’s analytics. The news comes as a major blow to…
Ransomware – the name spells disaster for businesses sometimes. Many are the business ventures worldwide that have had to face disastrous losses following ransomware strikes. Hence, combating ransomware is something that entrepreneurs all the world around accord top priority at…
Since nearly a decade now, Microsoft Operating Systems (OS) have this unique feature called “God Mode” that allows users to create a folder with a certain name and access the control panels from within a single folder. But Microsoft is…
( Update: check the latest version of Comodo’s mobile security app) A new type of malware that tricks its victims in to sharing their login credentials in mobile apps has been found affecting Android smartphones. The malware family, dubbed as…
There are many people who get confused with the terms antivirus and anti-malware and fail to understand the difference between them. A few years ago it was just viruses that computer users were worried about and simple, free antivirus software…
The Malware A very innovative kind of malware has struck and taken people by surprise in the suburbs of Philadelphia. Some residents of the Philadelphia suburb Tredyffrin have reportedly received speeding tickets on email with instructions to pay the fine…
Hospitals in the U.S. are bracing themselves to fight against a new kind of virus threat – one that doesn’t weaken their patients’ immunity but seizes their sensitive medical records and encrypts them. However, for an industry that is focussed…
Mac users no doubt are the luckiest of the lot; they are relatively safer. Yeah, they are much safer than the rest of us computer-internet users when it comes to Malware attacks. But trouble makers are there everywhere. It’s sort…
We typically use a device such as a computer or smartphone to connect to the internet for sharing information, surfing, performing ecommerce and other sensitive activities. This involves both incoming and outgoing network traffic. To defend any unauthorized person to…
The world’s attention is all about the effective use of the internet, right from browsing for a piece of information to shopping provisions online, internet is all in demand. The inception of Internet though not near holds the fort and…