Latest Comodo Antivirus Updates

Hackers Attacks on Retail Threaten All of Us

Hackers have had many rich targets to focus on since the dawn of the computer age and the burgeoning world of electronic commerce. Originally, criminal hackers’ targeted internal system and huge storage servers. More recently, they have launched all too…

Mac Antivirus

Beware of Unauthorised Resellers!

Beware of Unauthorised Resellers! The antivirus that you install on your computer should be a reputed one. It should be purchased from a well-known vendor, such as Comodo or an authorized reseller. This is good advice for purchasing software in…

Google Android Lollipop Introduces Smartphone Kill Switch

Smartphones are high in demand compared to PCs and Laptops, which gives a vast opportunity for the hackers to steal personal information, like contacts, images, business information and much more. Compromising smartphones are a huge target to hackers. Hackers are…

InfoGraphic: Comodo vs FinFisher Cyber Spyware

Comodo is weapons grade spyware protection

Important: How to Protect Yourself Against POODLE Attacks

POODLE Attacks? That is the unlikely term for a serious threat to Internet users. Google has recently revealed that criminal hackers have identified a way, under certain circumstances, to force a client and server establishing a secured connection to use…

trojan horse virus

Beware of the Trojan Festalco

Trojan Horse is a malicious content or code that does not have the trait of replicating. There are so many variants of Trojans. Most of them are in the form of executable files. On execution of these files, depending on…

Antivirus for Android

What is Android SMS Virus “Selfmite”?

Selfmite is a Worm, which is a sub categorized version of virus. Worm is a piece of malicious code that uses system networks to replicate themselves imposing a major threat onto the system. Basically worms do not require human intervention…

Do You Need Cloud Storage?

Cloud computing works over the internet through a network of collective sets of remote servers. A popular feature of cloud computing is online storage, which can offer convenient online access from any device. So, what is cloud storage? Cloud storage…

AntiVirus Protection: What You Need to Know

We think that Comodo has built all the right features into our Antivirus software, but that raises an important question for the consumer. What exactly are the right features to consider? This is particularly important because in addition to protecting…

Internet Security Advice for Students

Students have the same risks when online as everyone else, but more so because of their tendency to use more mobile devices, public computers and to engage in risky behavior. Mobile Devices:  This generation has embraced mobile computing as part…

Page 34 of 36« First...1020...3233343536