Latest Comodo Antivirus Blog Updates

Mac Antivirus

New Macro-Based Malware Attacks Windows and MacOS systems

A new form of Microsoft Word macro-based malware has been discovered by cyber security researchers. This malware can affect both Windows and MacOS systems but follows different methods of attack for each operating system.   The malicious macro is built-up…

Internet security

A New Attack That Turns Antivirus Software Into Malware

Here comes news about a new kind of attack that can turn an advanced antivirus security software itself into malware. Researchers have come up with reports about a new proof-of-concept exploit, which has been named DoubleAgent, which would hijack third-party…

Phishing attacks

How to Tackle Phishing Emails and Other Malicious Email Attacks

We have had, in the recent months, many reports of malicious email attacks, including those targeting Amazon and Netflix customers. Such malicious email attacks are on the rise; still it seems that even today there are many people, and many…

Increasing Fileless Malware Attacks

Nowadays, cybercriminals seem to prefer Fileless Malware Attacks on organizations. Most malware attacks can be detected, blocked and removed using malware removal tools or applications. However, Fileless Malware Attacks are non-malware attacks that utilize legitimate existing programs and applications and…

Antivirus

GOOGLE – Declares Microsoft Vulnerability in Public

GOOGLE has found that the Windows 10 Edge and Internet Explorer 11 has now been exposed to a severe web security vulnerability that aids the hackers to strike the browsers while they can execute malware code from remote and gain…

Smart home security

5 Ways to Protect Smart Homes

Modern homes adorned with TVs, refrigerators and other electronic gadgets are now susceptible to hackers’attack. Americans find their homes have already been hacked and there is an exponential rise of such cyber attacks giving jitters amidst the home owners. Gone…

Antivirus Security

Importance of AV Security Today

The enterprise network today is much different from what it earlier was. Employees today use all kinds of devices to connect to the enterprise network and also to do work. They also use the social media to share things and…

Trojan Security

Fake Trojan Flash Security Update Downloads Malware

New Android Trojan dupes victims with malicious fake Flash security update. Once initiated it can repeatedly download other malware of its choice to surreptitiously infect the device. The malicious app that imitates Adobe Flash Player tricks users into believing that…

Banking malware

New Malware Targets Banks, Financial Institutions Worldwide

Banks and financial institutions in over 30 countries worldwide have been targeted by a new malware in a new round of watering hole attack, as per recent reports. (Watering hole attacks, it much be remembered, are attacks in which the…

Antivirus

Advanced Antivirus Protection for the Digital Economy

Contrary to the opinion of certain experts, an antivirus (AV) program is not quite dead. A traditional AV program does provide some level of protection to the digital economy. However, it is not full-fledged protection.   In order to know…