Latest Comodo Antivirus Blog Updates

Internet Security

Why Internet Security is Absolutely Needed Today

The Internet thrives to be a basic yet effective digital communication medium for both personal and business purposes. While it greatly facilitates and accelerates the exchange of information around the world, the Internet remains an unsafe platform ridden with malware,…

What is a Trojan Horse and How it Affects Your PC

A Trojan horse is a kind of malware that is concealed to look more like an authorized software. Hackers create trojan codes to establish a connection to the victim’s system and gain illegal access to data without the user’s consent.…

Best Free Firewall

What is a Firewall?

A firewall is a protective barrier which safeguards computing devices from online threats. The primary purpose of the firewall software is to shield the computer from internet threats and the threats arising within the local network. Firewalls are an integral…

what is ripper virus

What is Ripper Virus?

Ripper is a type of virus that randomly infects disk write heads when its active in memory. It infects the disk writes, making the data invalid. Ripper virus can be less harmful, or it can be threatening, or it can…

Android Security Checklist

How Android malware scanner protects your phone or tablet?

Of late, it is widely noticed that mobile devices are targeted by online criminals and maybe your device too could be at grave danger. A free Android malware scanner in place can reveal such things before its late. However, there…

Bad Rabbit – What you need to know about this ransomware and its prevention?

Ransomware is a malicious software, that secretly downloads on to a computer and warns the user to delete or revoke access to their data. When the hacker has full control of the computer or network, they demand a ransom normally…

what is swen virus

What is Swen Virus?

Swen is a malicious program that replicates and spreads on its own, it is technically classified as a worm virus. Swen does not require any human aid to replicate and circulate not only inside a computer but also to other…

What is a DDoS attack?

A distributed denial-of-service (DDoS) attack also referred to as a Distributed Network Attack is a malicious attack aimed at disrupting normal traffic of a targeted server, service or network by puzzling the target or its surrounding infrastructure with overwhelming Internet…

SamSam Ransomware: Definition and Prevention

What is SamSam Ransomware? SamSam ransomware is a type of malware, its key objective is to get into an organization. After getting in, it waits and gathers a lot of data. In the meantime, the cybercriminal gains access to systems…

What is Session Hijacking Attack and how to prevent them?

Session hijacking is a web attack carried out by a cybercriminal to steal valuable data or information. It works based on the principle of computer sessions and the cybercriminals makes use of the active sessions. In order to better understand…