Latest Comodo Antivirus Blog Updates

What is a Trojan Horse and How it Affects Your PC

A Trojan horse is a kind of malware that is concealed to look more like an authorized software. Hackers create trojan codes to establish a connection to the victim’s system and gain illegal access to data without the user’s consent.…

Best Free Firewall

What is a Firewall?

A firewall is a protective barrier which safeguards computing devices from online threats. The primary purpose of the firewall software is to shield the computer from internet threats and the threats arising within the local network. Firewalls are an integral…

what is ripper virus

What is Ripper Virus?

Ripper is a type of virus that randomly infects disk write heads when its active in memory. It infects the disk writes, making the data invalid. Ripper virus can be less harmful, or it can be threatening, or it can…

Android Security Checklist

How Android malware scanner protects your phone or tablet?

Of late, it is widely noticed that mobile devices are targeted by online criminals and maybe your device too could be at grave danger. A free Android malware scanner in place can reveal such things before its late. However, there…

Bad Rabbit – What you need to know about this ransomware and its prevention?

Ransomware is a malicious software, that secretly downloads on to a computer and warns the user to delete or revoke access to their data. When the hacker has full control of the computer or network, they demand a ransom normally…

what is swen virus

What is Swen Virus?

Swen is a malicious program that replicates and spreads on its own, it is technically classified as a worm virus. Swen does not require any human aid to replicate and circulate not only inside a computer but also to other…

What is a DDoS attack?

A distributed denial-of-service (DDoS) attack also referred to as a Distributed Network Attack is a malicious attack aimed at disrupting normal traffic of a targeted server, service or network by puzzling the target or its surrounding infrastructure with overwhelming Internet…

SamSam Ransomware: Definition and Prevention

What is SamSam Ransomware? SamSam ransomware is a type of malware, its key objective is to get into an organization. After getting in, it waits and gathers a lot of data. In the meantime, the cybercriminal gains access to systems…

What is Session Hijacking Attack and how to prevent them?

Session hijacking is a web attack carried out by a cybercriminal to steal valuable data or information. It works based on the principle of computer sessions and the cybercriminals makes use of the active sessions. In order to better understand…

What is a Rumba Ransomware

What is a Rumba Ransomware?

Malware Type: Ransomware Family: STOP First Identified: January 19th 2019 Variant of: Djvu Ransomware Infection Through: Vulnerability of Pirated Software, Fake Windows Updates Ransom Size: $980 or $490 Ransom Message: _openme.txt Can be Decrypted: Yes Removal and Termination: Deploy the…

Page 21 of 53« First...10...1920212223...304050...Last »