Latest Comodo Antivirus Blog Updates

Computer Worm

Are You Safe Online? 5 Important Tips

Information flows today like never before. That’s because we have replaced impressions made on pieces of paper for storage with ones and zeros represented by electronically. We have built vast networks where ones and zeros that make up almost everything…

Don’t Download those SONY Pirated Films!

If you are not careful, free can be come at a very high cost. For several weeks, numerous file sharing sites have been providing at least 5 current and soon to be released films pirated from Sony Pictures in a…

antivirus

Have You Been a Victim of a Malware Attack?

Everyone today is a target of hackers. Windows computers are known for being more vulnerable to viruses and malware than other systems, but the reality is that criminal hackers are attacking all platforms with a vengeance. Macs, Linux and mobile…

CIS

Comodo Internet Security 8: The Best Gets Better

You know you deserve the very best in life, but your wallet probably isn’t big enough to afford a lot of the best things you would like. The very best house, best car or the best vacation are all out…

Hackers Attacks on Retail Threaten All of Us

Hackers have had many rich targets to focus on since the dawn of the computer age and the burgeoning world of electronic commerce. Originally, criminal hackers’ targeted internal system and huge storage servers. More recently, they have launched all too…

Mac Antivirus

Beware of Unauthorised Resellers!

Beware of Unauthorised Resellers! The antivirus that you install on your computer should be a reputed one. It should be purchased from a well-known vendor, such as Comodo or an authorized reseller. This is good advice for purchasing software in…

Google Android Lollipop Introduces Smartphone Kill Switch

Smartphones are high in demand compared to PCs and Laptops, which gives a vast opportunity for the hackers to steal personal information, like contacts, images, business information and much more. Compromising smartphones are a huge target to hackers. Hackers are…

InfoGraphic: Comodo vs FinFisher Cyber Spyware

Comodo is weapons grade spyware protection

Important: How to Protect Yourself Against POODLE Attacks

POODLE Attacks? That is the unlikely term for a serious threat to Internet users. Google has recently revealed that criminal hackers have identified a way, under certain circumstances, to force a client and server establishing a secured connection to use…

trojan horse virus

Beware of the Trojan Festalco

Trojan Horse is a malicious content or code that does not have the trait of replicating. There are so many variants of Trojans. Most of them are in the form of executable files. On execution of these files, depending on…