In today’s digital world, malware and cyber attacks have become ubiquitous. Gone are the days when there was only a handful of malicious programs such as viruses. Nowadays, new and powerful mal...
https://antivirus.comodo.com/blog/comodo-news/does-windows-10-need-antivirus/
What is ILOVEYOU virus? – Definition The ILOVEYOU virus is a computer virus (or) worm. It’s spread through an email with a subject line that said “I love you” in 2000. ILOVEYOU is one of ...
https://antivirus.comodo.com/blog/comodo-news/iloveyou-virus-and-its-removal/
Virus scan is part and parcel of a antivirus software, it scans a hard drive to detect malicious software in a computing device. Simply put, the goal-directed nature of a virus scanner software i...
https://antivirus.comodo.com/blog/comodo-news/what-is-virus-scanner/
What is free online virus scan? Well, it is simply the same as it sounds? This is different from your contemporary virus scanning because it works on the server on the Internet. Every free online...
https://antivirus.comodo.com/blog/comodo-news/best-free-online-virus-scanners-2018/
Today it’s more important to have protection on your PC because you never know when the cybercriminals will strike. The stake is such that you don’t only need Antivirus software, but also a m...
https://antivirus.comodo.com/blog/comodo-news/5-best-free-malware-removal-tools-2020/
The Internet is a dangerous place filled with all kinds of security threats. Therefore the moment your network – be it small or large – connects to the internet, it gets exposed to all kinds ...
https://antivirus.comodo.com/blog/comodo-news/types-of-firewall/
What is a Malware? Malware is a broader term for several types of malicious codes created by cybercriminals for preying on online users. Malware is the singly coined word for the words, “Malici...
https://antivirus.comodo.com/blog/comodo-news/malware-examples-and-their-removal/
The best virus scan is a process of using virus protection software to scan and identify viruses and malware in a computing device. It is an information security process that aims to review and i...
https://antivirus.comodo.com/blog/comodo-news/what-does-best-virus-scan-mean/
Here’s a list of virus scan or antivirus tools in the market using which PC users like you can protect your computers from various security threats posed by the ever-changing cybersecurity thre...
https://antivirus.comodo.com/blog/comodo-news/best-free-virus-scan-tools-2020/
Windows is the most popular operating system with the most number of users. It is user-friendly with numerous capabilities that have made it the number one operating system. The more users means ...
https://antivirus.comodo.com/blog/comodo-news/best-antivirus-windows-pc-2020/
Antivirus protection software is critical for every PC as it does a virus scan to detect and remove viruses. Without it, you risk losing your personal information, your files, and even the cash f...
https://antivirus.comodo.com/blog/comodo-news/best-free-virus-protection-2020/
Android security should be prioritized. As an Android user, guaranteeing the overall protection of your phone is a primary concern. Countless mobile threats can compromise not just the security o...
https://antivirus.comodo.com/blog/comodo-news/essential-android-security-checklist-in-2020/
In terms of numbers, Android is easily the world’s most popular operating system for mobile devices. This makes it an obvious target for malware creators. That means that all Android devices ne...
https://antivirus.comodo.com/blog/comodo-news/best-free-antivirus-for-android/
Even though everyone uses the term “virus protection”, what you really need is “malware protection”. Viruses are just one type of malicious software. These days there are plenty more. Adw...
These days, everybody needs virus protection. Yes, that includes Mac owners. The good news is that you can get some great antivirus programs for absolutely free. Here’s a guide to help you know...
https://antivirus.comodo.com/blog/comodo-news/best-free-virus-protection/
These days, everyone needs an antivirus app on their mobile device. There are good antivirus apps. There are free antivirus apps. There are even some good, free antivirus apps. Here’s a guide t...
https://antivirus.comodo.com/blog/comodo-news/free-antivirus-app/
Almost all the devices connected to the internet are vulnerable to malware infection as hackers find new ways and methods to attack and infest the PCs. Users should update the software with new s...
https://antivirus.comodo.com/blog/comodo-news/how-to-get-rid-of-a-virus/
Adware is a software that displays unauthorized advertising download and displays pop-ups or banners on the program’s user-interface when the user is connected to the internet. This type of sof...
https://antivirus.comodo.com/blog/comodo-news/what-is-adware-and-their-removal-methods/
Scareware is a type of malware that masquerades as real virus protection to trick victims into paying and downloading malicious software to clean up infections it pretends to detect. Such softwar...
https://antivirus.comodo.com/blog/comodo-news/what-is-scareware/
The MyDoom virus, also known as Novarg, is another worm capable of developing a backdoor in a victim computer’s operating system. The family of MyDoom e-mail worms continues to be an active ...
Melih Abdulhayoğlu is a Turkish-American engineer, inventor, entrepreneur, internet security advocate, and founder of Comodo Group. Melih grew up in Turkey, where he developed an interest in ...
https://antivirus.comodo.com/blog/comodo-news/melih-abdulhayoglu/
PC security has been the greatest challenge for customers lately, following the WannaCry ransomware that hit major organization including the NHS a year ago, and Petya, yet another ransomware att...
https://antivirus.comodo.com/blog/comodo-news/best-antivirus-for-mac-2018/
Before, getting hit by a worm or adware was a cause of concern. But today, you’d be fortunate if you only get infected by these less-dangerous malware. Malware and viruses have developed over t...
https://antivirus.comodo.com/blog/comodo-news/ransomware-attackers-demand/
Software updates and mobile security patches are important for your mobile devices because they help in repairing security holes and removing outdated features and adding new ones. Software updat...
If you are using Android, the most extensively used operating system in the world, then make sure to have the best Android antivirus app and other security tools installed on your Android device....
https://antivirus.comodo.com/blog/comodo-news/do-you-really-need-an-android-antivirus-app/
Mobile security applications for Google’s Android platform protect Android smartphones and tablet mobile devices from malware and unauthorized access that can lead to theft of the device or acc...
https://antivirus.comodo.com/blog/comodo-news/google-releases-its-annual-android-security-report/
Savvy smartphone users who know the importance of having mobile antivirus are also aware of the mobile update suggestions that pop up on their devices. But for many users, these security updates ...
https://antivirus.comodo.com/blog/comodo-news/google-releases-a-security-patch-for-android/
Phones can get damaged both internally and externally: The external damage will typically be quite visible, while the internal damage could be hidden in plain sight. General malware includes troj...
https://antivirus.comodo.com/blog/comodo-news/how-to-remove-android-malware-from-android-devices/
Why is mobile security important? In today’s world, most of our mobile devices, such as smartphones, tablets, and watches, contain our family photos, calendar appointments, and financial inform...
https://antivirus.comodo.com/blog/comodo-news/increase-your-mobile-security-from-hacking-attacks/
Wondering why mobile security is important today? With the number of mobile device users increasing year after year, the need for mobile security is also gaining ground. Mobile phones have now be...
https://antivirus.comodo.com/blog/comodo-news/why-mobile-security-is-important-today/
Mobile security should be every Android user’s concern. This is not only just because your Android phone plays an important role in your daily life. But more importantly, guaranteeing rigid mob...
https://antivirus.comodo.com/blog/comodo-news/mobile-security-tips-to-keep-your-android-mobile-safe/
Antivirus for Android apps are widely available on the Google Play Store. These are Android applications that help users in keeping their phones secure. However, to guarantee excellent Android se...
https://antivirus.comodo.com/blog/comodo-news/antivirus-for-android-app/
How does malware infect Android smartphones? The location and behavior of the user are two main influential factors that provide opportunities for hackers to infect Android devices. Hackers disgu...
https://antivirus.comodo.com/blog/comodo-news/virus-protection-for-android/
What is Network Firewall? A Network Firewall is a security device that reduces or denies suspicious access to enterprise intranet network or when the network is connected to the internet. It filt...
The Internet thrives to be a basic yet effective digital communication medium for both personal and business purposes. While it greatly facilitates and accelerates the exchange of information aro...
https://antivirus.comodo.com/blog/comodo-news/internet-security-software/
A firewall is a protective barrier which safeguards computing devices from online threats. The primary purpose of the firewall software is to shield the computer from internet threats and the thr...
https://antivirus.comodo.com/blog/comodo-news/what-is-firewall/
Ransomware is a malicious software, that secretly downloads on to a computer and warns the user to delete or revoke access to their data. When the hacker has full control of the computer or netwo...
https://antivirus.comodo.com/blog/comodo-news/bad-rabbit-ransomware/
Session hijacking is a web attack carried out by a cybercriminal to steal valuable data or information. It works based on the principle of computer sessions and the cybercriminals makes use of th...
https://antivirus.comodo.com/blog/comodo-news/session-hijacking/
Malware Type: Ransomware Family: STOP First Identified: January 19th 2019 Variant of: Djvu Ransomware Infection Through: Vulnerability of Pirated Software, Fake Windows Updates Ransom Size: $980 ...
https://antivirus.comodo.com/blog/comodo-news/what-is-a-rumba-ransomware/
Nanocore is a remote access Trojan virus otherwise known as RAT Malware which is used in both targeted and non-targeted attacks. Ever since malware engineers created it, RATs have aided online cr...
What is a Cyber Attack? Cyberattacks are attacks launched from one or more computers against another computer, multiple computers or networks. Cyberattacks are divided into two broad categories: ...
A fork bomb is also called a wabbit or rabbit virus that was crafted by malicious hackers to launch a denial-of-service attack on the target system. The fork bomb virus replicates itself and corr...
https://antivirus.comodo.com/blog/comodo-news/fork-bomb-virus/
Shanmoon was discovered by Seculert, Symantec, and Kaspersky Lab on 16 August 2012 that targets 32-bit NT kernel versions of Microsoft Windows. It is a modular virus and is also known as W32.DisT...
https://antivirus.comodo.com/blog/comodo-news/shamoon-virus/
CryptoWall belongs to the ransomware family that uses advanced techniques to infiltrate computers and hides from its victims. Simply put, the Cryptowall is a Trojan horse that encrypts files on t...
A zero-day exploit is a software flaw or a vulnerability. Hackers use this as an exploit to attack the user’s system even before the software vendor identifies it and a security patch fix is av...
https://antivirus.comodo.com/blog/comodo-news/zero-day-exploit/
The latest ransomware in the cyberspace called “Petya” is infecting computers around the world at an incredible speed. It uses a vulnerability in the Windows OS that Microsoft patched in Marc...
https://antivirus.comodo.com/blog/comodo-news/petya-ransomware/
NotPetya virus outwardly resembles the Petya ransomware in many ways, however, the fact is that it’s different and a lot more dangerous than Petya. When Petya affected numerous systems even the...
https://antivirus.comodo.com/blog/comodo-news/notpetya-ransomware/
The term logic bomb refers to the malware also called slag code which gets activated by a response to an event. For instance, launching an application or when a specific date/time is reached – ...
2017 was a pretty rough year in terms of cybersecurity: ransomware, state-sponsored attacks, phishing scams, and big companies (like Equifax) failing to stick to security best practices (like imp...
https://antivirus.comodo.com/blog/comodo-news/looking-ahead-cyber-security-2018/
January 2018 is over, we’re now on to the second month of the new year. Indications are that 2018 would be as eventful as 2017 was, as regards cyber crimes and cyber attacks. The much-evolve...
https://antivirus.comodo.com/blog/comodo-news/seven-major-threat-trends-watched-2018/
Looking back at 2017… Bitcoin- the term is familiar now even to the not-so-tech-savvy layman; the internet is so full of success stories of people who have made their fortune by trading in Bitc...
https://antivirus.comodo.com/blog/comodo-news/cryptocurrency-trend-2018/
It was the first time that German’s AV-Test had tested Google Play, and showed how it results proved to be a disappointment. This only proved the theory that Google play had to use third-party ...
https://antivirus.comodo.com/blog/comodo-news/top-android-antivirus-apps-2018/
Traditional antivirus programs detect malicious codes by cross-checking with the database of virus definition that they have. The antivirus programs try to find out if there is a match. Every day...
https://antivirus.comodo.com/blog/comodo-news/best-cloud-based-antivirus-software-2018/
This article shows everything you wanted to know about the best antivirus available in the market. Why you need antivirus for windows? Unless you’ve security software installed, your PC or lapt...
https://antivirus.comodo.com/blog/comodo-news/best-antivirus-for-windows-2018/
We have seen how most of the virus is Windows-centric, and that malicious program intended for Windows cannot harm a Mac. It’s true to an extent but now the trend has changed. The cyber crimina...
https://antivirus.comodo.com/blog/comodo-news/best-mac-antivirus-protection-2018/
A backdoor is a malicious computer program used to provide the attacker with unauthorized remote access to a compromised PC by exploiting security vulnerabilities. This backdoor virus works in th...
https://antivirus.comodo.com/blog/comodo-news/backdoor-virus/
Code red is a computer worm that was identified in July 2001, when computers running on Internet Information Services (IIS) web server of Microsoft were found compromised. The after effect of the...
Computer Virus Similar to the virus which affects the human body, a computer virus is a malicious program that affects the computer to choke or bring down the normal functioning. Usually, a co...
https://antivirus.comodo.com/blog/comodo-news/polymorphic-virus/
Locky is one kind of latest ransomware. It was first released in 2016. The IT security geeks had discovered that the malware authors send ransomware infected emails demanding for payment through ...
https://antivirus.comodo.com/blog/comodo-news/locky-ransomware/
The wannacry ransomware is composed of various components Files with encryption keys Application to encrypt data Application to decrypt data A copy of Tor Browser Unlike other ransomware, wannacr...
https://antivirus.comodo.com/blog/comodo-news/what-is-wannacry-ransomware/
Stuxnet worm is a rootkit exploit. The Stuxnet worm is targeted at data acquisition (SCADA) systems and supervisory control. On the other side, it is vital to know that the SCADA systems are used...
https://antivirus.comodo.com/blog/comodo-news/what-is-stuxnet-worm/
The Zeus malware, also known as the ZeuS or Zbot, is a Trojan Horse used to steal confidential information from the victims’ computers. The primary ways by which Zeus malware infects a computer...
https://antivirus.comodo.com/blog/comodo-news/what-is-zeus-malware/
Conficker is a computer worm developed by malware authors to infect Windows computers with the vulnerability (MS08-067) and spread the infection to other such vulnerable Windows computers connect...
https://antivirus.comodo.com/blog/comodo-news/conficker-worm/
Koobface is a type of computer worm that infects unwary users through social media platforms like Facebook. It infects computers of unwary users in an attempt to gather sensitive information such...
https://antivirus.comodo.com/blog/comodo-news/what-is-koobface/
Computer Virus Even before we try to understand what a boot sector virus is, let us understand what is a computer virus. In the online world, the term computer virus refers to a malicious program...
https://antivirus.comodo.com/blog/comodo-news/boot-sector-virus/
Bots are Internet robots also known as crawlers, spiders, and web bots. They are automated programs developed for performing repetitive tasks. With the computing power available to programmers, b...
https://antivirus.comodo.com/blog/comodo-news/what-is-a-bot/
The word Pharming is coined from the words “phishing” and “farming”. It refers to the cybercrime activities such as phishing, where a website’s traffic is hacked in order to steal the s...
https://antivirus.comodo.com/blog/comodo-news/what-is-pharming/
The Morris worm was released on November 2nd, 1988 by Robert Tappan Morris. It was the first of computer worms to be distributed on the internet that would not work as planned. Origins As mention...
Crimeware is a set of programs or any computer program that has been designed to facilitate illegal activity online. Many spyware programs, keyloggers, and browser hijackers can be considered cri...
https://antivirus.comodo.com/blog/comodo-news/what-is-crimeware/
Browser hijacking is a kind of unwanted program that changes a browser’s settings without a user’s approval, to inject unwanted promotion into the user’s browser. A browser hijacker may sub...
https://antivirus.comodo.com/blog/comodo-news/what-is-browser-hijacking/
With the influence of sophisticated technology high and low, hackers and otith the new security pather bad guys from the virtual underworld find ways to infect users’ computers. Most of us are ...
https://antivirus.comodo.com/blog/comodo-news/virus-checker/
A virus that adds its code to the macros associated with spreadsheets, documents, and other data files in a system is called as a macro virus. Any computer infected by macro virus needs an antivi...
Trojans or Trojan Horses is often mimicked as genuine software by malware authors to gain access to the target victim’s system. Most often the users are tricked by means of social engineering t...
https://antivirus.comodo.com/blog/comodo-news/what-is-trojan-horse/
In the IT world, it is generally assumed that Linux is more secure compared to other operating systems. In the recent times, it is noticed that the targeted attacks on Linux based machines are on...
https://antivirus.comodo.com/blog/comodo-news/linux-antivirus/
Today the increasing number of cyber attacks are targeted on individuals and small size businesses. The attacks are aimed at robbing an individual’s identity which is referred to as the identit...
https://antivirus.comodo.com/blog/comodo-news/what-is-identity-theft/
Cybercrime is at an all-time high. Criminals are not only targeting home users; they are also preying on businesses jeopardizing their websites and acquiring sensitive clientele information. How ...
https://antivirus.comodo.com/blog/comodo-news/how-to-know-if-my-android-phone-has-a-virus/
A zero-day also known as Day Zero or 0-day refers to the computing vulnerability which is often sought by the hackers to exploit for selfish and illegal reasons. Zero Day Vulnerability Attacks ar...
https://antivirus.comodo.com/blog/comodo-news/new-zero-day-vulnerability-attack-windows/
Many of us might have fallen a prey to cyber criminals at least once in the last few years and suffered a bit due to data breach issues. In all cases, a cybercriminal uses malware to infiltrate t...
https://antivirus.comodo.com/blog/comodo-news/data-breach-survival-guide/
When a particular type of malware infects and controls multiple internet-connected devices, it is called a botnet. In most of the cases, the device owners/users are totally unaware of the botnet ...
https://antivirus.comodo.com/blog/comodo-news/what-is-a-botnet-attack/
Hacking is a process performed by malware authors to attack a computer system or a network. The person who is involved in the hacking process is known as a hacker. Hackers find a way to gain unau...
https://antivirus.comodo.com/blog/comodo-news/hacking-definition-and-its-types/
A phishing attack is a type of social engineering attack in which hackers send fake e-mails to gather confidential and private information for criminal activities identity theft. While phishing e...
https://antivirus.comodo.com/blog/comodo-news/what-is-phishing/
A computer worm is a type of malware which is intended for infecting vulnerable computers in a network. Computer worms tend to quickly replicate themselves and wiggle their way into poorly ...
https://antivirus.comodo.com/blog/comodo-news/computer-worm-virus/
More and more people are falling a prey to the cyber attacks and losing the valuable data to an unrecognizable online fraudster is becoming one of the biggest nightmares. Say for example, the imp...
https://antivirus.comodo.com/blog/comodo-news/how-computer-virus-spread/
A botnet refers to the network of infected computers that is controlled by a hacker remotely. The hacker makes use of the devices in the network to send spam, stage DDoS attacks, or spread viruse...
https://antivirus.comodo.com/blog/comodo-news/what-is-botnet/
Intel’s Software Guard Extensions (SGX) feature allows programs to establish secure enclaves on Intel processors. The secure enclave develops a safe haven for sensitive information, even if mal...
https://antivirus.comodo.com/blog/comodo-news/foreshadow-attacks-on-intel-chips/
Cybercrime is a type of crime in which the attacker compromises a computer, networked device or a network for personal gains. The attacker or criminal involved in cyber crimes are known as cyberc...
https://antivirus.comodo.com/blog/comodo-news/what-is-cybercrime/
Adware Definition: Adware is any software application that shows unwanted ads while a program is running. Most adware arrives embedded inside a free software supported by advertisements that show...
https://antivirus.comodo.com/blog/comodo-news/best-free-adware-removal-tool/
Melissa is a macro virus that was wide-spread through a suspicious e-mail attachment in 1999. It was initially sent as a Microsoft Word file, which when clicked to open, emailed the malicious con...
https://antivirus.comodo.com/blog/comodo-news/melissa-virus-stay-protected/
In an organization, Employees play a vital role in information security. Thus it is critical for organizations to educate employees about safe computing habits in addition to having the right sec...
https://antivirus.comodo.com/blog/comodo-news/7-tips-to-avoid-phishing-attacks/
Individuals using a computer connected to the Internet are susceptible to the threats that online predators and computer hackers pose. These computer hacking experts generally use phishing scams,...
https://antivirus.comodo.com/blog/comodo-news/what-is-computer-hacking-and-its-prevention/
Gain deeper insights into world-class network security for small enterprises/businesses like yours, the information technology protection for small businesses has become more complex with loads o...
https://antivirus.comodo.com/blog/comodo-news/security-solution-for-small-business/
What is Ransomware? Ransomware may also be known as ransom-malware is a malicious software which threatens to delete or deny access to data, once it takes over the computer. The cybercrimin...
https://antivirus.comodo.com/blog/comodo-news/what-is-ransomware-and-their-prevention/
If you are an Android user, you might have come across or heard of Android malware. Nowadays, the media is also full of reports about Android malware infecting unwary Android users. Does this mea...
https://antivirus.comodo.com/blog/comodo-news/check-android-app-safe-install/
Emotet is a new banking trojan. It is a downloader that functions to download other trojans into the system or a network. It is the most expensive and destructive malware affecting state, tribal,...
A Trojan horse is a particular type of malware that is mostly disguised as authorized software. Trojans can be used by hackers and cyber-thieves trying to gain access to a user’s system. This t...
https://antivirus.comodo.com/blog/comodo-news/trojan-virus-types-and-their-removal/
Computer viruses come in many forms, it is important to know what you are dealing with. However, even before we get started with knowing the types of viruses, it is ideal to comprehend the comput...
https://antivirus.comodo.com/blog/comodo-news/types-of-computer-virus-and-their-removal/
Malware: Meaning Malware refers to a program or code designed to execute something harmful to your computer or your private information. When compared to the old viruses that would just shut your...
https://antivirus.comodo.com/blog/comodo-news/how-to-get-rid-malware/
Malware, is defined as the malicious software file or program harmful to a computer user which can execute different malicious functions like encrypting, stealing or deleting sensitive data, hija...
https://antivirus.comodo.com/blog/comodo-news/malware-definition-and-their-removal/
Servers are very critical. Because they are responsible for running businesses. Which means the moment they crash, your business goes down. Loss of productivity, loss of customers and who know...
https://antivirus.comodo.com/blog/comodo-news/how-to-secure-your-server/
In the recent times, we get to hear stories of online criminals spying on people through baby monitors, failing of smart locks after a software update, personal information theft through webcams ...
https://antivirus.comodo.com/blog/comodo-news/internet-things-era-6-ways-stay-safe/
In today’s connected world, malware attacks are on the rise. The recent WannaCry ransomware attack which crippled thousands of business across the globe is a good example of the level and sophi...
https://antivirus.comodo.com/blog/comodo-news/cryptolocker-and-its-removal/
Google is constantly enhancing features to render Playstore protection from these ever-evolving threats, however, there is no end to users, downloading an infected app. If your Android device is ...
https://antivirus.comodo.com/blog/comodo-news/protect-android-from-malware-attacks/
What is a Computer Worm Virus The term worm in computing refers to a malicious software whose main role is to infect computers, remain active on the infected system and self-replicate. A co...
https://antivirus.comodo.com/blog/comodo-news/what-is-computer-worm/
While installing any app from Google Play, users come across the app permission request. For instance, the message prompted on the mobile screen reads, “Allow Messenger to send and view SMS mes...
https://antivirus.comodo.com/blog/comodo-news/guide-to-android-app-permissions/
Nowadays spyware and malware come in different forms, and it is extremely difficult for an average user to distinguish legitimate software and malware or spyware. The spyware is the malicious sof...
https://antivirus.comodo.com/blog/comodo-news/best-free-malware-removal-software/
Computer viruses are those malicious programs that once they infect your machine will start causing immense havoc on your computer. You will have to watch out and alert yourself when your compute...
https://antivirus.comodo.com/blog/comodo-news/how-to-get-rid-of-computer-virus/
Malware is not the only threat to Mac Os as vulnerable Wi-Fi networks and malicious websites can also threaten your safety. Recently, the Mac has become more of a target than it has been in the p...
https://antivirus.comodo.com/blog/comodo-news/how-to-remove-malware-from-mac-devices/
In recent times, ransomware attacks are on the rise globally. Hackers are spreading new variants of ransomware to infect smartphones. Not only have we seen an increase in ransomware attacks, b...
https://antivirus.comodo.com/blog/comodo-news/protect-android-smartphone-from-ransomware-attacks/
Ransomware usually catches people off-guard. Most people do not worry about ransomware or any malware, but then they hit with malware. That is when they realize that backups are non-existence or ...
https://antivirus.comodo.com/blog/comodo-news/tips-to-protect-business-from-ransomware/
In the last week of May, researchers announced of a new Mac-based cryptojacking attacking the Apple’s forums. The malware deceived users to unintentionally run software that mines privacy coin ...
https://antivirus.comodo.com/blog/comodo-news/monreo-malware-attacking-mac-devices/
Comodo the only solution to win ‘Top Product’ award from leading antivirus testing organization Comodo Internet Security Premium has landed another ‘Top Product’ award from AV-TEST in its...
A new kind of Cryptominning malware is spreading fastly, infecting nearly 500,000 computers in just three days. Researchers have named it as ‘WinstarNssmMiner,’ and it is built based on an op...
https://antivirus.comodo.com/blog/comodo-news/brutal-crypto-mining-malware-crashes-your-pc/
Day by day, the virus and other malware threats are growing even bigger than anticipated – thereby, it has become vital for any smart device user to stay updated to steer clear of the dangers. ...
https://antivirus.comodo.com/blog/comodo-news/good-antivirus-features/
Three months ago, Tim Hortons coffee and doughnut fast food restaurants reportedly suffered from a severe malware attack. The malware first struck the Tim Hortons point-of-sale (POS) terminals an...
https://antivirus.comodo.com/blog/comodo-news/national-doughnut-day-stay-safe-from-malware-attacks/
The technological advancement has made it easier for cybercriminals by granting access to everything while sitting in one place. In today’s ever-evolving cyber attacks, hackers develop more adv...
https://antivirus.comodo.com/blog/comodo-news/stay-safe-from-cybercrime/
The modern-day malware is not easy to handle. Because there’s so many of them – adware, spyware, ransomware and more. And they just don’t affect Windows and Linux alone. Mac OS too are vuln...
https://antivirus.comodo.com/blog/comodo-news/how-to-remove-malware-from-mac/
A computer virus is a malicious software program or piece of code created by a hacker to upload onto a user’s computer without their knowledge for performing malicious actions. Computer viruses...
https://antivirus.comodo.com/blog/comodo-news/definition-of-computer-virus/
Despite Google’s immense efforts in securing Android; the widely-used operating system remains vulnerable to numerous online threats. The best way to steer clear of the threats is to install...
https://antivirus.comodo.com/blog/comodo-news/best-antivirus-android-apps/
Smartphones have evolved much in the recent years. Today, smartphones are capable of doing things which can be done only by a computer, a few years back. Unfortunately, with more features added t...
https://antivirus.comodo.com/blog/comodo-news/antivirus-protection-for-android/
It’s often believed that Mac computers are 100 percent hassle-free but that’s not true at all. There are various reasons for a Mac computer to slow-down and like any other device, it requires...
https://antivirus.comodo.com/blog/comodo-news/essential-guide-for-mac-cleaner/
Last year, Facebook Messenger was plagued with FacexWorm malware. It sent out fake messages in an attempt to steal user passwords and other sensitive information. FacexWorm malware has resurfaced...
https://antivirus.comodo.com/blog/comodo-news/facexworm-malware-targeting-crypto-users/
Computer virus or malware generally enter into the system without being noticed. These are common problems faced by computer users at least once in a while. During such unanticipated security bre...
https://antivirus.comodo.com/blog/comodo-news/computer-virus-removal/
The term “Malware” roots its name from Malicious Software which is a type of program developed by bad guys from the dark world to infect computers for many a reason. Malware can infect the sy...
https://antivirus.comodo.com/blog/comodo-news/what-is-malware-how-to-protect-from-it/
In today’s digital era, Virus protection is crucial to protect your computer against viruses, trojans and other types of malware. Though zero-day attacks can penetrate some antivirus, antivi...
Trojan horse is a type of malware created by hackers to look more like a legitimate software. It attaches itself to genuine files that are downloaded from the internet. Trojan horses find their w...
https://antivirus.comodo.com/blog/comodo-news/what-is-trojan-horse-virus/
Users across the globe prefer Android over other platforms due to its user-friendly interface and customizability. Due to its popularity, it is often targeted by hackers for malicious purposes. A...
https://antivirus.comodo.com/blog/comodo-news/best-security-apps-for-android/
Google Play store has become the breeding place for android virus or simply malware. Millions of Android phones get infected each day by downloading these infected apps. Only recently, in January...
https://antivirus.comodo.com/blog/comodo-news/virus-removal-for-android/
We are very proud of the performance of Comodo Internet Security 10.1 in the AV-TEST review. The AV-TEST institute, an independent IT security and AV research organization designated Comodo Inter...
Firewall is a security defense software system that works to battle against malware and phishing attacks. Some OSes like the Windows have a built-in firewall to offer instant protection from thre...
https://antivirus.comodo.com/blog/comodo-news/best-firewall-for-windows/
Malware- it seems to be an integral part of life for anyone who connects to the internet in one way or the other. Malware is not only annoying, it’s dangerous as well. It could damage your comp...
https://antivirus.comodo.com/blog/comodo-news/windows-malware-removal/
Android is considered to be the most popular operating system for smartphones, making it an inviting target for scammers and hackers. Almost 97% of the malware identified for mobile devices have ...
https://antivirus.comodo.com/blog/comodo-news/rottensys-malware-affecting-android-phones/
There has been a consistent upsurge with new computer technologies while the hackers storm the virtual space with new sophisticated malware attacks like viruses, spyware, and ransomware, which ca...
This Infographic brings about the best methods to secure your device and network online. As threats are everyday lurking into your systems it is best that you safeguard them to the earliest. —�...
https://antivirus.comodo.com/blog/comodo-news/tips-to-keep-you-safe-online/
Among all the different kinds of malware that infect systems and networks all around the world, the ransomware happens to be the most dreaded. This because ransomware is one malware that can b...
https://antivirus.comodo.com/blog/comodo-news/ransomware-types-its-prevention/
A new Android malware strain called RedDrop is now available with an extensive range of malicious actions, such as those causing financial loss and data loss on infected devices. This malware, de...
https://antivirus.comodo.com/blog/comodo-news/reddrop-malware-affects-android-devices/
What is antivirus? Antivirus (that’s how we usually call the antivirus software or anti malware software), also abbreviated as AV, is basically the software that we use to detect, block and ...
https://antivirus.comodo.com/blog/comodo-news/antivirus-definition-remove-virus-from-computer/
With digital threats on the rise, cybersecurity has to be strengthened to encounter such threats from attacking both corporate networks – small or big!! and even users’ personal networks. Hac...
https://antivirus.comodo.com/blog/comodo-news/ransomware-types-and-prevention/
Here’s a list of best free antivirus or anti-malware software using which PC users like you can protect your computers from various malware threats. Whether you are looking for a free antivi...
https://antivirus.comodo.com/blog/comodo-news/selecting-best-free-anti-malware-software-2018/
What a year 2017 had been for cryptographic forms of money, particularly Bitcoin, which had as of late hit the approximately USD 20,000 in mid-December 2017 before slamming down to USD 11,000 and...
https://antivirus.comodo.com/blog/comodo-news/safeguard-cryptowallets-using-antivirus-software/
Today’s security market is flooded with many antivirus software. Selecting one among them is certainly not an easy task without having to refer to online antivirus reviews. You have to check fo...
https://antivirus.comodo.com/blog/comodo-news/best-antivirus-reviews-2018/
It raining security threats. The world has seen its share of ransomware attacks. Unfortunately, this is not going to end any sooner. Not until the hacking community decides to take a nap. And ...
https://antivirus.comodo.com/blog/comodo-news/secure-personal-computer/
What is the most basic form of protection you can give to your PC(s)? So that they stay safe against various security attacks? Yes, you guessed it right. It is the antivirus software. For those o...
https://antivirus.comodo.com/blog/comodo-news/todays-antivirus-vs-traditional-antivirus-software/
BitCoins and crypto currency – these are the talk of the town. In December 2017, the value of a single BitCoin crossed $19,000 to nearly touch $20,000. It had been steadily increasing and analy...
https://antivirus.comodo.com/blog/comodo-news/detect-remove-bitcoin-miner-virus/
The words ‘Spectre’ and ‘Meltdown’ have been making the cybersecurity headlines frequently in the past few days and has been unnerving mobile device users across the world. In this blog, ...
https://antivirus.comodo.com/blog/comodo-news/spectre-meltdown-conundrum-explained/
We keep hearing from Google that Play Store is getting more secure by the day; now that Play Protect program – Google’s own antivirus – has been introduced to scan various android apps whic...
https://antivirus.comodo.com/blog/comodo-news/good-android-antivirus-app/
Antivirus software has been around for a long time. With time, its importance has increased and it now forms a vital part of every internet or endpoint protection. At a time like this, if your so...
https://antivirus.comodo.com/blog/comodo-news/5-things-while-selecting-antivirus-pc/
The controversy continues. Though Apple iPhones run on the iOS (formerly iPhone OS) – which is undoubtedly an advanced, secure, and stable mobile operating system – it is not 100% secure. Cyb...
https://antivirus.comodo.com/blog/comodo-news/antivirus-for-iphone-software-requirement/
It is that time of the year when we have to remind PC users about their online security. Christmas brings with it a lot of events like getting together with family, buying gifts for them, decidin...
https://antivirus.comodo.com/blog/comodo-news/stay-safe-this-christmas-2017-from-virus-threats/
A Trojan named Ursnif is a new version that is being tested with modified codes, this is to make it more effective when it comes to attack the banking domain and software. A recent report in Zdne...
Earlier this year, mobile security experts from Palo Alto Networks, found that Android devices could be subjected to ‘Android Toast Overlay Attack’, which is a vulnerability affecting the Toa...
https://antivirus.comodo.com/blog/comodo-news/malware-exploiting-toast-overlay-attack-discovered/
Android’s new built-in antivirus program, Google Play Protect, just had its first big test — and it has failed miserably. An independent German lab AV-Test conducted a test on Android antivir...
https://antivirus.comodo.com/blog/comodo-news/google-play-protect-fails-android-antivirus-tests/
Fearing spying concerns the US administration headed by Donald Trump has decided to ban Kaspersky security products from its government networks. The US Senate officially on Monday voted to ban t...
https://antivirus.comodo.com/blog/comodo-news/kaspersky-banned-from-us-government-networks/
It’s hard to come across a device which is not Bluetooth enabled these days. Therefore the blueborne bug, which exploits a security flaw or weakness in the Bluetooth technology, has the potenti...
https://antivirus.comodo.com/blog/comodo-news/blueborne-vulnerability-can-affect-many-devices/
Cybersecurity researchers have reported that Google is fighting a massive malware outbreak, and it is considered to be the second biggest outbreak that it has faced so far. Dubbed as ExpensiveWal...
https://antivirus.comodo.com/blog/comodo-news/massive-malware-outbreak-hits-google-playstore/
We live in an era where every other day witnesses a security attack of one sort or the other. Therefore’s there’s no doubt you need an antivirus package to keep your PC(s) safe. To safeguard ...
https://antivirus.comodo.com/blog/comodo-news/antivirus-protecting-pc/
GhostCtrl Android malware is a backdoor that can control the functionalities of an infected Android device. It is a Remote Access Trojan (RAT) that can also steal and exfiltrate information. It c...
https://antivirus.comodo.com/blog/comodo-news/ghostctrl-android-malware-locks-device-demands-ransom/
Installing Android security apps for your android devices might seem like an overkill. But they important. Mainly because android is by far the most popular mobile operating system in use today. ...
https://antivirus.comodo.com/blog/comodo-news/android-antivirus-do-you-really-need-them/
Having workloads allocated over multiple cloud platforms and on-premises is the truth by which the enterprise IT industry survives. According to the research and analysis by Enterprise Strategy G...
https://antivirus.comodo.com/blog/comodo-news/multi-cloud-security/
Android users have had their share of ransomware attacks this year. And yet things don’t seem to be getting any better for them. A new variant of the Koler ransomware – which first struck in ...
https://antivirus.comodo.com/blog/comodo-news/koler-ransomware-strikes/
Did the NotPetya Ransomware Have More Ulterior Motives? Is the “NotPetya Ransomware” much more than a deadly ransomware? Also being called as Petya, ExPetr, SortaPetya, Petrwrap, Goldeneye, N...
https://antivirus.comodo.com/blog/comodo-news/data-destroying-notpetya-masquerades-ransomware/
Since the first renowned social media site Myspace hit the scene, the social networking landscape has been exploding with various networking sites like Facebook, LinkedIn, Twitter, Meetup etc. An...
https://antivirus.comodo.com/blog/comodo-news/become-secure-social-media-day/
Google is boosting Android security in its next release of its operating system – Android O. More serious security measures are being implemented. This release will include control features to ...
https://antivirus.comodo.com/blog/comodo-news/android-o-serious-security-ransomware/
New Android Trojan dupes victims with malicious fake Flash security update. Once initiated it can repeatedly download other malware of its choice to surreptitiously infect the device. The malicio...
https://antivirus.comodo.com/blog/comodo-news/fake-trojan-flash-security-update-downloads-malware/
Hackers have targeted two elite defense organizations in India through Whatsapp. They had distributed two malicious files targeting defense and security personnel of the National Defense Academy ...
Gooligan is a new strain of Android malware that’s spreading really fast. As per available reports, this malware has already compromised over one million Google accounts and at present it sprea...
https://antivirus.comodo.com/blog/comodo-news/gooligan-fast-spreads-android-malware/
More than 6% of Android devices worldwide (as it is known as of now) have been affected with malicious code through BadKernel vulnerable apps. This infection occurred by exploiting the BadKernel ...
https://antivirus.comodo.com/blog/comodo-news/android-devices-affected-badkernel-vulnerability/
Here’s some news for android users who know that it’s not just antivirus for android that’s needed for virus removal or to encounter malware threats; it’s a thorough understanding of malw...
Mobile Wallets: An introduction Today we depend a lot on the internet for financial transactions. The mobile wallet takes this a step forward; it is the digital or virtual equivalent of the physi...
https://antivirus.comodo.com/blog/comodo-news/mobile-wallets-discussing-security-issues/
The Windows 10 Anniversary Update, which has been released on August 2nd, has developed issues as it crashes under an Avast antivirus update on some systems. It’s on the Skylate Virtualizatio...
https://antivirus.comodo.com/blog/comodo-news/windows-10-update-crashes-avast-antivirus/
Cyber security experts have discovered a software flaw that would allow cyber criminals to gain control of mobile phones and telecommunication networks. This is a pretty serious vulnerability as ...
https://antivirus.comodo.com/blog/comodo-news/flawed-code-puts-cell-networks-at-risk/
The law-abiding cyber community might finally have some good news coming their way. As the first half of 2016 comes to a close, internet security researchers are observing a decline in malware’...
https://antivirus.comodo.com/blog/comodo-news/sharp-drop-ransomware-attacks-raises-eyebrows/
On Wednesday, 25th May, many people opened their emails to find a mail from LinkedIn sitting in their inbox. But unlike other times, this wasn’t a mail that suggested the users about relevant j...
WhatsApp has not released any “Gold” or premium versions of its widely popular messenger service. The WhatsApp Gold app that is presently in the news is malware, and if you ever receive or ha...
https://antivirus.comodo.com/blog/comodo-news/whatsapp-gold-malware/
Less than a week after one of internet’s most visited adult entertainment website, PornHub, announced a Bug Bounty program to test its internet security, a hacker claims to have breached the we...
https://antivirus.comodo.com/blog/comodo-news/lone-hacker-claims-breached-pornhub-sold-database/
Jokes about forgetful doctors leaving scalpels inside their patients’ guts are becoming cliched now. In today’s “connected” world, where technology is fast replacing jobs, computers too c...
Wordpress is perhaps very popular as a CMS among those who are not that tech savvy. It’s easy to use and of course inexpensive too. But many who use WordPress never realize that this easy, inex...
Yes, Mobile Security Threats are real…and critical Mobile devices are so common and so much a part of our day to day lives that we can’t perhaps live without them. Thus it’s easy for hacker...
https://antivirus.comodo.com/blog/comodo-news/mobile-security-threats-are-real-and-critical/
The Bangladesh Bank – the Central bank of Bangladesh, has been hacked and breached, and nearly $1 billion has been stolen by cyberthieves. They have gotten away with about $80 million, and chan...
Apple no longer holds the trophy of being more immune to virus problems. In a first, many Apple users recently reported their Mac computers being infected with a kind of ransomware that encrypts ...
Another malware is now targeting Android devices. Heimdal Security, a Denmark-based security solutions company, had discovered that a malicious APK, termed as the Mazar BOT has been targeting and...
https://antivirus.comodo.com/blog/comodo-news/mazar-bot-could-wipe-out-your-phone/
The advent of smartphones has led to total dependency on the device due to its astounding capabilities. Smartphones can be used for making and receiving calls, checking and sending emails, browsi...
https://antivirus.comodo.com/blog/comodo-news/android-smartphones-need-antivirus-protection/
Security software are built to protect your PC against imminent threats and help the system run smoothly. But you can’t say the same thing about Kaspersky Internet Security, aka KIS in short �...
https://antivirus.comodo.com/blog/comodo-news/pc-users-find-kaspersky-software-too-hot-to-handle/
AVG has once again upset its customer base and proven that it lacks due diligence and competence needed in an antivirus company to stay afloat in the security business. Just few weeks before the ...
Ba dum tssssss! That’s the sound of 2015 ringing out, ushering the oncoming of 2016 as a year full of new hopes and big ideas that is sure to make a difference in our lives. 2015 was a great ye...
https://antivirus.comodo.com/blog/comodo-news/we-wish-you-a-happy-new-year-2016/
A multinational coalition of organisations led by Europol’s European Cybercrime Center (EC3) has working successfully to disrupt the Ramnit malware family. Ramnit is a Computer worm that affect...
Comodo is weapons grade spyware protection The post InfoGraphic: Comodo vs FinFisher Cyber Spyware appeared first on Comodo Antivirus Blogs | Anti-Virus Software Updates .
For over 2 1/2 years Comodo Internet Security has stood atop the results chart of the Matousec Proactive Internet Security Challenge 64. Matousec is an independent project that tests security sof...
https://antivirus.comodo.com/blog/comodo-news/matousec-comodo-leads-pack/