Latest Comodo Antivirus Blog Updates

Best Free Malware Protection

Foreshadow Attacks on Intel Chips is Causing Serious Vulnerabilities

Intel’s Software Guard Extensions (SGX) feature allows programs to establish secure enclaves on Intel processors. The secure enclave develops a safe haven for sensitive information, even if malware or another malady compromises the main computer. A global research group comprising…

mac malware

New Wi-Fi attack can crack your passwords

Did you know that there exists a simple way to crack passwords from routers with WPA2 security? Fortunately, this hidden truth was uncovered by the white hat hackers recently! Everybody is using Wi-Fi network these days, and the usual protocols…

Antivirus

What is Cybercrime and How to Defend Against It

Cybercrime is a type of crime in which the attacker compromises a computer, networked device or a network for personal gains. The attacker or criminal involved in cyber crimes are known as cybercriminals. While most cybercrimes are carried out for…

what is ransomware

What is Ransomware?

Ransomware is a malicious software which is also known as ransom-malware that threatens to delete or deny access to data, once it takes control over a computing device. The cybercriminal who initiated the attack commands ransom to be paid through…

Adware Removal Tool

What is Adware and How to Get Rid of it

Adware Definition: Adware is any software application that shows unwanted ads while a program is running. Most adware arrives embedded inside a free software supported by advertisements that show up in pop-up windows or on a toolbar on a computer…

Antivirus protection

What is Melissa Virus? How to Stay Protected from them

Melissa is a macro virus that was wide-spread through a suspicious e-mail attachment in 1999. It was initially sent as a Microsoft Word file, which when clicked to open, emailed the malicious content to another 50 contacts of the victim’s…

phishing attacks

Tips to Avoid Phishing Attacks

In an organization, Employees play a vital role in information security. Thus it is critical for organizations to educate employees about safe computing habits in addition to having the right security tools (such as antivirus software or virus protection software)…

computer hacking

Computer Hacking – What are they and how to stay protected?

Individuals using a computer connected to the Internet are susceptible to the threats that online predators and computer hackers pose. These computer hacking experts generally use phishing scams, instant messages or spam email and bogus websites in order to deliver…

cyber security 2018

Best Security Solution for Small Business

Gain deeper insights into world-class network security for small enterprises/businesses like yours, the information technology protection for small businesses has become more complex with loads of online threats appearing daily! Similar to the giants in the space, the small ones…

what is ransomware

Ransomware. What are they and how to prevent them?

  What is Ransomware?   Ransomware may also be known as ransom-malware is a malicious software which threatens to delete or deny access to data, once it takes over the computer. The cybercriminal demands ransom usually through cryptocurrency or credit…