Latest Comodo Antivirus Blog Updates

what is petya ransomware

Petya Ransomware Attack: What is it and How can it be stopped?

The latest ransomware in the cyberspace called “Petya” is infecting computers around the world at an incredible speed. It uses a vulnerability in the Windows OS that Microsoft patched in March 2017 — notably, it is the same virus that…

NotPetya Ransomware

What is NotPetya?

NotPetya virus outwardly resembles the Petya ransomware in many ways, however, the fact is that it’s different and a lot more dangerous than Petya. When Petya affected numerous systems even the best antivirus and virus removal programs failed to deduct…

What is Logic Bomb

What is a Logic Bomb?

The term logic bomb refers to the malware also called slag code which gets activated by a response to an event. For instance, launching an application or when a specific date/time is reached – it triggers the logic bomb malware…

What is Backdoor Virus?

A backdoor is a malicious computer program used to provide the attacker with unauthorized remote access to a compromised PC by exploiting security vulnerabilities. This backdoor virus works in the background and hides from the user. It is quite difficult…

what-is-codered

What is Code Red Worm?

Code red is a computer worm that was identified in July 2001, when computers running on Internet Information Services (IIS) web server of Microsoft were found compromised. The after effect of the attack caused a damage of billions of dollars…

What is polymorphic virus

What is Polymorphic Virus and how do you deal with it?

  Computer Virus Similar to the virus which affects the human body, a computer virus is a malicious program that affects the computer to choke or bring down the normal functioning. Usually, a computer virus self-replicates by copying itself to…

locky ransomware

What is Locky Ransomware?

Locky is one kind of latest ransomware. It was first released in 2016. The IT security geeks had discovered that the malware authors send ransomware infected emails demanding for payment through an invoice in the form of malicious Microsoft Word…

what is wannacry

What is WannaCry Ransomware?

The wannacry ransomware is composed of various components Files with encryption keys Application to encrypt data Application to decrypt data A copy of Tor Browser Unlike other ransomware, wannacry has taken the internet world by storm as it created a…

Zeus Trojan Virus

What is Zeus Malware?

The Zeus malware, also known as the ZeuS or Zbot, is a Trojan Horse used to steal confidential information from the victims’ computers. The primary ways by which Zeus malware infects a computer are through phishing attacks and drive-by downloads.…

what is conficker

What is Conficker Worm?

Conficker is a computer worm developed by malware authors to infect Windows computers with the vulnerability (MS08-067) and spread the infection to other such vulnerable Windows computers connected to the network without any human intervention. It is also called Downadup.…