POODLE Attacks? That is the unlikely term for a serious threat to Internet users. Google has recently revealed that criminal hackers have identified a way, under certain circumstances, to force a client and server establishing a secured connection to use…
Trojan Horse is a malicious content or code that does not have the trait of replicating. There are so many variants of Trojans. Most of them are in the form of executable files. On execution of these files, depending on…
Selfmite is a Worm, which is a sub categorized version of virus. Worm is a piece of malicious code that uses system networks to replicate themselves imposing a major threat onto the system. Basically worms do not require human intervention…
Cloud computing works over the internet through a network of collective sets of remote servers. A popular feature of cloud computing is online storage, which can offer convenient online access from any device. So, what is cloud storage? Cloud storage…
We think that Comodo has built all the right features into our Antivirus software, but that raises an important question for the consumer. What exactly are the right features to consider? This is particularly important because in addition to protecting…
Students have the same risks when online as everyone else, but more so because of their tendency to use more mobile devices, public computers and to engage in risky behavior. Mobile Devices: This generation has embraced mobile computing as part…
You may notice that some antivirus come with a firewall and some do not. If you us the Comodo Internet Security Suite you have the option of install the antivirus and firewall components separately. That may raise a question in…
The recent release of the iOS 8 Apple operating system for mobile computers introduces new technologies and features for Apple mobile devices that enhance security and privacy. In the current Internet threat environment, it is critical that you protect your…
YouTube and other web sites have millions of videos. So many that very few are found by the public in their searches. Yet frequently one “goes viral” and takes off. Everyone wants to see it, but you need to be…
Antivirus systems include a signature file, a so called “blacklist”, that allows them to identify and exterminate known threats. Some also include a so called “whitelist” of files that are known to be valid and ok to run. Conventional antivirus…