Reading Time: 2 minutes The recent, unprecedented attack on peace and stability in Ukraine has captured the whole world’s attention. Comodo has had longstanding operations in Ukraine. To our st...
https://blog.comodo.com/pc-security/message-from-comodo-ceo/
Reading Time: 2 minutes Cyberwarfare is the New Front Line Comodo has taken the security of customers very seriously, whether those customers are at home in the US or abroad. Upon hearing the tra...
Reading Time: 2 minutes About Rain Networks Based in Seattle, Washington, Rain Networks is a boutique distributor specializing in network security products. The company provides businesses with t...
Reading Time: 2 minutes Ransomware and malware are two major cybersecurity threats facing companies around the globe. The total cost of ransomware attacks is expected to reach $20 billion by 2021...
Reading Time: 2 minutes Using mass phishing campaigns and off-the-shelf kits, cyber criminals based in different regions of the world are running sophisticated ransomware, malware and hacking cam...
Reading Time: 2 minutes Teleos Systems Limited is the U.K.’s largest independent supplier of veterinary practice management software. The company was founded more than two decades ago and has c...
https://blog.comodo.com/pc-security/teleos-comodo-endpoint-protection-solution/
Reading Time: 2 minutes In the world of managed information technology (IT) services, bigger doesn’t necessarily mean better. Sunergo IT is a boutique IT solutions firm that specializes in de...
Reading Time: 2 minutes The market for managed security services is growing rapidly. Information technology (IT) infrastructures are more complex and attackers are deploying an ever-increasing ar...
Reading Time: 3 minutes Today’s businesses are caught in an epidemic of cyber threats that are continually evolving, are challenging to diagnose, and have become even more complicated to defend...
Reading Time: 6 minutes Maze creators threaten to publish the confidential data of victims unless the ransom is paid. Comodo Cyber Security team also find Equation group mutex in latest attack. R...
Reading Time: 6 minutes Comodo Cyber Security team reveals the inner-workings of the latest strain of this persistent threat The Comodo Cyber Security team constantly researches the latest ransom...
https://blog.comodo.com/pc-security/dharma-2-0-ransomware-continues-with-new-variant/
Reading Time: 3 minutes Modern-day working environments have changed significantly over the years, and the IT landscape has evolved along with them. Digital transformations have now necessitated ...
Reading Time: 3 minutes Early warning systems save lives. People in tsunami risk zones rely on seismic activity sensors and sea level gauges for advance alerts that give them time to get to safet...
Reading Time: 3 minutes ‘Tis the season for holiday shopping. Economic forecasters anticipate holiday retail sales will reach a new all-time high in 2019, with U.S. spending set to top $725 bi...
https://blog.comodo.com/e-commerce/avoid-becoming-a-victim-on-black-friday-and-cyber-monday/
Reading Time: 3 minutes Usually summer means vacation and relaxation. But as we’ve seen in recent history, summer plans can be brutally disrupted when cyber threats strike. Just two years ago, ...
https://blog.comodo.com/malware/dont-forget-your-security-protection-framework-in-this-summer/
Reading Time: 5 minutes With millions of people using the Internet daily for several different activities ranging from paying bills to buying and selling, the need for a reliable Internet securit...
https://blog.comodo.com/pc-security/top-10-internet-security-tips-for-2019/
Reading Time: 2 minutes Comodo AEP is selected as the best ransomware protection program in 2018 cyber security excellence awards. Comodo Advanced Endpoint Protection software is a comprehensive ...
https://blog.comodo.com/pc-security/comodo-aep-win-cybersecurity-awards/
Reading Time: 3 minutes What Is Phishing? Phishing is a method employed by cybercriminals to access email accounts and systems using deception rather than defeating security protections. In basic...
Reading Time: 5 minutes Cryptomining has become a gold rush of nowadays, and cybercriminals are also seized by it. They invent more and more cunning gimmicks to infect users’ machines and make ...
https://blog.comodo.com/pc-security/cryptomining-executed-through-legitimate-software/
Reading Time: 5 minutes Internet security is a branch of computer security which comprises various security measures exercised for ensuring the security of transactions done online. In the proces...
https://blog.comodo.com/pc-security/what-is-internet-security/
Reading Time: 5 minutes Would you be scared or at least anxious if you’d found a subpoena to the US district court in your email box? Most of the people definitely would. That’s exactly what ...
https://blog.comodo.com/pc-security/subpoena-new-variant-of-sigma-ransomware/
Reading Time: 3 minutes Summer has yet to officially start, but to me it feels like it’s begun already. My hometown of Toronto has been experiencing sweltering temperatures for the past couple ...
https://blog.comodo.com/pc-security/data-breach-at-ticketfly/
Reading Time: 4 minutes Phishing trap for One Drive users. How to avoid falling prey? Cybercriminals often use very cunning and inventive tricks to manipulate victim’s mind in phishing attacks....
https://blog.comodo.com/pc-security/phishing-trap-for-microsoft-users-detected-comodo/
Reading Time: 2 minutes AV-TEST, an international cybersecurity research body, honored Comodo Antivirus as the best antivirus product for Windows PCs for the month of February. Comodo AV bested i...
https://blog.comodo.com/pc-security/comodo-best-av-pcs-february-2018/
Reading Time: 3 minutes A Gartner study reads, “By 2019, IT service desks utilizing machine learning enhanced technologies will free up to 30% of support capacity.” A tier of intelligent auto...
https://blog.comodo.com/pc-security/itsm-best-cost-effective-solution-better-service/
Reading Time: 2 minutes IT professionals understand the necessity of patches, even if it’s not one of their favorite things to do. However, if someone told you that there was an option that did...
https://blog.comodo.com/pc-security/3-important-things-windows-patch-management/
Reading Time: 2 minutes If you have kids, you know that the internet can be a dangerous place. But the internet can be equally, if not more dangerous to your employees and colleagues. They are ad...
https://blog.comodo.com/pc-security/family-business-web-filtering-solution/
Reading Time: 3 minutes Sometimes a marketing analogy misleads us about the complex idea it is trying to simplify. A great example of this is equating PC security to the immune system of the huma...
Reading Time: 4 minutes Comodo Threat Intelligence Lab discovered a new October phishing campaign with the infamous IKARUSdilapidated Locky ransomware payload, marking the 4th hybrid of this evol...
Reading Time: 4 minutes New Ransomware, Botnet Threat: IKARUSdilapidated Attack is August ’17 Locky Rebirth A Special Update from the Comodo Threat Intelligence Lab A new August 2018 ransomware...
https://blog.comodo.com/comodo-news/new-locky-ransomware-trojan-spotted/
Reading Time: 3 minutes Digital transformation is speeding up especially in the retail section. Store environment is feeling the heat that they need to catch up with the implementation and stay a...
https://blog.comodo.com/web-security/think-retailers-compromising-security/
Reading Time: 2 minutes Petya, WannaCry, and More: How to Protect Yourself from the New Generation of Ransomware Register here: https://www.comodo.com/landing/comodo-conducts-webinar-on-protecti...
Reading Time: 2 minutes With malware ransoms now rising to as high as $1M (USD), there is heightened urgency for organizations and their CISOs, CSOs and other leaders to understand the latest th...
https://blog.comodo.com/pc-security/making-sense-needs-vs-cyber-vendor-claims-analyst-meets-expert/
Reading Time: 3 minutes Why should fathers day be about you alone? It could well be about your children, right? After all, they are your flesh and blood and the reason you are working hard. So le...
https://blog.comodo.com/pc-security/try-something-unique-this-fathers-day/
Reading Time: 3 minutes Here we go again…it should come as no surprise to anyone who follows cybersecurity that another massive cyberattack has occurred, on a global scale. This time, the ranso...
https://blog.comodo.com/pc-security/wannacry-copycats-expected-increase-solutions/
Reading Time: 2 minutes Mozilla and Tor recently released patches for the Firefox browser as well as the Firefox-based Tor browser aiming to block a recent attack. This attack exploited a Firefox...
https://blog.comodo.com/pc-security/mozilla-tor-release-patches-block-active-zero-day-exploits/
Reading Time: 3 minutes This should come as a surprise, a mild or perhaps not-so-mild shock, to those many people who lock their computer screens while temporarily moving away. Well, your system,...
https://blog.comodo.com/pc-security/stealing-data-from-locked-pcs-possible-using-usb-device/
Reading Time: 2 minutes Fantom, a new ransomware discovered recently, strikes disguised as a legitimate Microsoft Windows update. Thus it tricks users into downloading it, thereby paving the way ...
https://blog.comodo.com/pc-security/ransomware-strikes-posing-windows-update/
Reading Time: 2 minutes DDoS attacks (Distributed Denial of Service attacks) and the data breaches that accompany such attacks are of serious consequence; these constitute the major share of cybe...
https://blog.comodo.com/pc-security/when-ddos-attacks-botnets-play-mischief/
Reading Time: 3 minutes US politician and Texas Representative Michael C.Burgess has voiced a very strong opinion regarding the issue of malware attacks when he said that Ransomware perpetrators ...
https://blog.comodo.com/pc-security/ransomware-criminals-should-be-shot-at-sunrise/
Reading Time: 2 minutes Today, the Comodo organization announced that for the ninth consecutive month, Comodo has increased its market share leadership position as the number one digital certific...
Reading Time: 3 minutes You work in IT services, so you are well aware that the demand for security, especially among small- and mid-sized businesses, is rising in correlation with the number and...
https://blog.comodo.com/pc-security/boost-your-msp-revenue-by-becoming-a-mssp/
Reading Time: 2 minutes YouTube is the world’s second largest search engine for a good reaon. From viewing all the latest viral videos to finding workout tutorials, from streaming Ted Talks to ...
https://blog.comodo.com/pc-security/7-smart-tricks-to-make-the-most-of-youtube/
Reading Time: 2 minutes From: WBC
https://blog.comodo.com/pc-security/fake-website-imitates-westpac-banking-corporation-for-phishing/
Reading Time: 2 minutes Remember when online security meant avoiding those sites on the wrong side of the tracks? No more. Malvertising is booming—not only in the number of attacks, but in soph...
https://blog.comodo.com/malware/beware-ad-attacks-malvertising-is-booming/
Reading Time: 2 minutes Phishing scams are continuing to plague Twitter users, now through the platform’s Direct Message (DM) feature. As many people know, with the DM feature, users can send d...
https://blog.comodo.com/pc-security/twitter-direct-message-phishing-scams-continue/
Reading Time: 2 minutes Health related information is very personal, which makes it prized by businesses and by cyber criminals. A study conducted by Timothy Libert, a doctoral student at the Uni...
https://blog.comodo.com/pc-security/study-health-related-web-sites-leak-personal-data/
Reading Time: 2 minutes It is a sign of the times that a cyber criminal makes the FBI’s top 10 most wanted list. And the Feds are serious about finding him. The United States Department of Stat...
https://blog.comodo.com/it-security/want-3-million-find-botnet-admin-evgeniy-bogachev/
Reading Time: 1 minute Security updates released this week by Mozilla include security fixes for numerous vulnerabilities in Firefox, Firefox ESR, and Thunderbird. These include three critical se...
https://blog.comodo.com/pc-security/mozzilla-releases-critical-security-updates-firefox-thunderbird/
Reading Time: 2 minutes The only thing cybercriminals like more than activities that expose social security numbers are ones that involve debit/credit card transactions. With millions of people f...
https://blog.comodo.com/it-security/tax-season-identity-theft-season/
Reading Time: 2 minutes Lenovo has had some explaining to do this week. Lenovo has been shipping laptops and personal computers since 2010 with adware it uses to inject advertising into their cus...
https://blog.comodo.com/comodo-news/lenovo-users-risk-man-middle-attacks-superfish/
Reading Time: 2 minutes Comodo announced today announced that our Cloud-based Anti-spam Gateway (ASG) service filtered its 100 millionth spam email this month with over 645,0000 viruses blocked. ...
https://blog.comodo.com/pc-security/comodo-antispam-gateway-filters-100-millionth-spam-email/
Reading Time: 3 minutes The four most used antivirus have been put to the test and found wanting. We are not surprised. Comodo long ago concluded that the conventional approach to Internet securi...
https://blog.comodo.com/pc-security/study-used-antivirus-take-6-months-catch-threats/
Reading Time: 2 minutes It was first reported in early January that AOL ad distribution networks were serving malware infected ads on high profile web sites, such as the Huffington Post. Worse, t...
https://blog.comodo.com/pc-security/aol-ad-networks-distributing-malvertising/
Reading Time: 1 minute Hackers know some people just can’t resist the allure of free porn, as 100,000 Facebook users learned the hard way. In just 2 days this week 100,000 Facebook users downlo...
https://blog.comodo.com/pc-security/free-porn-costly-100000-facebook-users/
Reading Time: 2 minutes Identity theft is the fastest growing crime and is costing Americans millions of dollars, not to mention the many hours wasted resolving issues. Here are some tips to keep...
https://blog.comodo.com/pc-security/10-steps-avoid-identity-theft/
Reading Time: 1 minute The Linux GNU C Library (glibc) versions prior to 2.18 are vulnerable to remote code execution via a vulnerability in the gethostbyname function. The vulnerability, nicknam...
https://blog.comodo.com/it-security/whos-afraid-linux-ghost/
Reading Time: 2 minutes Apple has released security updates for OS X, Safari, iOS and Apple TV to address multiple vulnerabilities, one of which could allow a remote attacker to take control of a...
https://blog.comodo.com/pc-security/apple-releases-critical-security-updates/
Reading Time: 2 minutes Snowmageddon 2015 is upon us! At this moment, the east coast of the United States is in the early stages of a snowstorm that is expected to be one of the greatest of all t...
https://blog.comodo.com/comodo-news/survive-snomageddon-2015-online/
Reading Time: 2 minutes Criminals are using a new zero day vulnerability in the Adobe Flash Player to conduct drive-by-downloads, infecting unsuspecting web site visitors with malicious software....
https://blog.comodo.com/pc-security/zero-day-vulnerability-adobe-player-threatens-web-users/
Reading Time: 2 minutes Twitter hacks have become increasingly common and several high profile hoaxes raise serious questions about Internet Security. On Friday the Twitter accounts of two promin...
https://blog.comodo.com/it-security/world-war-iii-begun-beware-twitter-hack-hoaxes/
Reading Time: 2 minutes When is a computer virus not a computer virus? When it is Vosteran. It may enter your computer unnoticed and change your internet browsers settings such as your home page ...
https://blog.comodo.com/pc-security/remove-dreaded-vosteran-browser-hi-jacker/
Reading Time: 2 minutes One of the most dangerous places on earth maybe your email inbox, considering the number of sophisticated email scams underway. Homeland Security is alerting computer user...
https://blog.comodo.com/pc-security/beware-inbox-govt-reports-new-email-phishing-scams/
Reading Time: 2 minutes The problem with conventional antivirus software is that they are like a bomb disposal unit that has not yet figured out where the bomb is. They have to find the bomb to d...
https://blog.comodo.com/it-security/sandbox-nice-auto-sandboxing-essential/
Reading Time: 2 minutes This week Mozilla addressed 3 critical security vulnerabilities in the release of Firefox 35 this week. Firefox 35 also includes some interesting new features such asa cro...
Reading Time: 4 minutes Once again, terror is in the news and dominates much of the national discussion. A major European city, the great City of Lights, was brought to a standstill last week dea...
https://blog.comodo.com/it-security/online-privacy-security-concerns-age-terror/
Reading Time: 1 minute Apple has released critical security updates for OS X Mountain Lion, Mavericks, and Yosemite to address multiple vulnerabilities in the Network Time Protocol daemon. Exploi...
https://blog.comodo.com/pc-security/apple-issues-critical-os-x-security-updates/
Reading Time: 2 minutes Everyone loves to get something for free. Over the past few weeks thousands of people have not let a little thing like copyright law stop them from enjoying at least 5 cur...
Reading Time: 3 minutes Mysteries are the most popular genre in books, movies and films. Everyone loves to solve a mystery and we now have a doozy of one in real life! The data breach of Sony Pic...
https://blog.comodo.com/it-security/hollywood-whodunit-hacked-sony/
Reading Time: 1 minute Mozilla has released security updates to address critical security flaws in Firefox and Thunderbird. These vulnerabilities may allow an attacker to obtain sensitive informa...
https://blog.comodo.com/pc-security/critical-security-flaws-firefox-require-updates/
Reading Time: 2 minutes Some people say that the future of Internet Security is Containerization. Comodo says the future is now! Comodo has announced the release of its Internet Security 8 (CIS 8...
https://blog.comodo.com/comodo-news/comodo-proves-containerization-future-internet-security-cis-8/
Reading Time: 3 minutes One of the most popular malware programs used by criminal hackers to defraud computer users is called Awola. Awola and its variants are “rogue anti spyware” and appe...
https://blog.comodo.com/pc-security/remove-awola-rogue-anti-spyware/
Reading Time: 1 minute Nobody is perfect, but in a critical aspect Comodo Internet Security is. Perfect protection against malware! In recent testing by the highly respected Independent AV-Test L...
https://blog.comodo.com/comodo-news/av-test-labs-comodo-perfect-protection-windows-8/
Reading Time: 1 minute Adobe has released security updates to address a vulnerability in Flash Player which could potentially allow a remote attacker to take control of an affected system. The up...
https://blog.comodo.com/pc-security/adobe-fixes-critical-security-flaw-flash-player/
Reading Time: 2 minutes The first video phone was a sensation at the 1939 World’s Fair, and again a quarter century later at the 1964 World’s Fair. It was the tech of the future! Somehow, it ...
https://blog.comodo.com/pc-security/webcam-vulnerability-watching/
Reading Time: 2 minutes Update: check the latest version of Comodo’s free mobile security app Apple released security updates for iOS devices, OS X Yosemite and Apple TV this week to address mu...
https://blog.comodo.com/mobile-security/apple-releases-security-updates-address-many-issues/
Reading Time: 2 minutes Among its monthly bulletins announced this week, Microsoft announced a fix for vulnerability so old that if it was a person it could vote and have a driver’s license. In...
Reading Time: 2 minutes US Homeland Security sent out an alert this week about an email phishing campaign that is distributing the “Drye” (or Dryze) banking malware. Drye targets users of ban...
https://blog.comodo.com/pc-security/homeland-security-warns-phishing-spreading-banking-malware/
Reading Time: 2 minutes On October 9th, Computing Security Magazine named Comodo Endpoint Security Manager (CESM) the “Anti Malware Solution Of the Year for 2014” at their annual awards dinne...
https://blog.comodo.com/comodo-news/computing-security-magazine-honors-comodo-endpoint-security/
Reading Time: 3 minutes Selfmite is a Worm, a category of computer virus. A worm contains malicious code that uses system networks to replicate themselves. They are major threat to a computer and...
https://blog.comodo.com/malware/understanding-android-sms-virus-selfmite/
Reading Time: 2 minutes The opportunities for hackers and cybercriminals never seems to end. Microsoft issued a warning this week on an unpatched zero day vulnerability that threatens users of Wi...
https://blog.comodo.com/it-security/microsoft-plagued-zero-day-vulnerabilities/
Reading Time: 3 minutes Parents have the responsibility of teaching their kids right from wrong, caring for and protecting them at all costs, right? Unfortunately some parents still don’t consi...
https://blog.comodo.com/pc-security/keeping-kids-safe-online/
Reading Time: 1 minute Apple has released fixes for OS X Mountain Lion v10.8.5 and OS X Mavericks v10.9.5 to address vulnerabilities in SSL 3.0, referred to as the POODLE bug. An attacker can use...
https://blog.comodo.com/it-security/apple-fixes-tame-poodle-bug-macs/
Reading Time: 2 minutes A Personal Firewall controls network communication in and out of a single user’s computer and will restrict the communication based on security policies. A personal fire...
Reading Time: 1 minute Comodo has released a new Chromium browser that has all of the features of our popular Comodo Dragon browser, but the look and feel of Chrome. Like Comodo Dragon and Comodo...
https://blog.comodo.com/comodo-news/comodo-adds-chromium-secure-choice-secure-browsers/
Reading Time: 1 minute Crime may pay, but Google is making stopping crime also pay. The latest updates for the Chrome Browser and Chrome OS released this week included fixes for bugs submitted by...
https://blog.comodo.com/pc-security/google-chrome-update-includes-75000-whitehat-hackers/
Reading Time: 3 minutes So called “autorun viruses” were developed to infect external devices, such as infecting a victim’s PC while opening a flash drive in Windows Explorer. An autorun vi...
https://blog.comodo.com/malware/manually-removing-autorun-virus/
Reading Time: 2 minutes At their most basic, firewalls work like a filter between your computer/network and the Internet. You can program what you want to get out and what you want to get in. Eve...
Reading Time: 2 minutes Jimmy John’s became the latest high profile retailer to report a possible breach of their point-of-sale system and a compromise of cardholder data. Jimmy John’s operat...
https://blog.comodo.com/pc-security/jimmy-johns-bite-of-cardholder-data/
Reading Time: 1 minute Linux and MAC OS X users need to be aware that a crtitical flaw in the "Bourne Agains Shell" (BASH) that processes commands may allow remote attackers to execute arbitrary ...
https://blog.comodo.com/it-security/linux-mac-users-shellshocked-bash-vulnerability/
Reading Time: 2 minutes Update: check the latest version of Comodo’s free mobile security app Apple has released updates for iOS 8 that fix critical security issues and add file encryption that...
https://blog.comodo.com/mobile-security/apple-enhances-security-privacy-ios-8/
Reading Time: 1 minute Adobe has released security updates for Adobe Reader and Acrobat for Windows and Macintosh. These updates address vulnerabilities that could potentially allow an attacker t...
https://blog.comodo.com/pc-security/critical-security-updates-available-adobe-reader-acrobat/
Reading Time: 1 minute Microsoft’s September “Patch Tuesday” security updates this week included 37 security patches for Internet Explorer, including a critical zero day defect. The term ze...
https://blog.comodo.com/malware/microsoft-patches-critical-internet-explorer-bugs/
Reading Time: 2 minutes When you are a celebrity you want exposure, but Apple’s iCloud has given a list of some of Hollywood’s top female celebrities more exposure than they bargained for. Ov...
Reading Time: 2 minutes Mozilla has released its latest security updates for the Firefox browser and Thunderbird email client. The updates fix numerous vulnerability issues, some that an attacker...
https://blog.comodo.com/pc-security/mozilla-releases-critical-security-updates/
Reading Time: 2 minutes Microsoft suffered great embarrassment this month when it was learned that a Windows patch it released with its August Patch Tuesday updates, could actually cause a “Blu...
https://blog.comodo.com/pc-security/microsoft-fixes-august-patch-tuesday-faux-pas/
Reading Time: 1 minute Google has released Chrome 37.0.2062.94 for Windows, Mac and Linux. This update includes 50 security fixes some of which could allow a remote attacker to obtain unauthorize...
Reading Time: 1 minute Few concepts epitomizes the modern American economy than the Supermarket. It is the one place we all visit at least once a week. That’s why it is particularly disconcerti...
https://blog.comodo.com/pc-security/supermarket-data-breaches/
Reading Time: 2 minutes Microsoft’s monthly security updates are supposed to resolve problems not cause them. However, the folks from Redmond have had to withdraw an update released in last wee...
https://blog.comodo.com/pc-security/microsoft-security-update-triggers-blue-screen-death/
Reading Time: 1 minute Apple has released a Safari security update to address vulnerabilities which could allow an attacker to execute arbitrary code or cause an unexpected application terminatio...
https://blog.comodo.com/pc-security/apple-safar-security-updates-increasing-frequency/
Reading Time: 2 minutes If it’s the second Tuesday of the month, it is time for Microsoft’s Security Updates, aka “Patch Tuesday”. The Microsoft August 2014 Security Bulletin includes cri...
Reading Time: 2 minutes Last week, Microsoft announced they will end support for the IE7 and IE 8 versions of their Internet Explorer browser after January 12th 2016 and will dramatically limit t...
https://blog.comodo.com/pc-security/microsoft-abandon-old-versions-internet-explorer/
Reading Time: 3 minutes If you are like me, you find it very annoying to be required to frequently change your password for your computer or for an online application. However, it is a simple way...
https://blog.comodo.com/pc-security/1-2-billion-reasons-change-password/
Reading Time: 3 minutes Comodo announced this week the latest addition to its portfolio of endpoint security products, Comodo SecureBox. SecureBox is a secure desktop application that enables use...
https://blog.comodo.com/comodo-news/endpoint-security-gets-boost-comodo-securebox/
Reading Time: 3 minutes Summer may be hard upon us, especially here in the very steamy New York area, but it is not too early to prepare for sending kids back to school. In fact, my daughter will...
https://blog.comodo.com/pc-security/10-back-school-internet-security-tips/
Reading Time: 3 minutes When I read about hackers and cyber criminals I often think of the old TV show Get Smart. After vanquishing a villain, Agent Maxwell Smart would often recite a lament that...
https://blog.comodo.com/it-security/hackers-dark-side-tech-revolution/
Reading Time: 1 minute The Mozilla has released security updates to address multiple vulnerabilities in their Firefox browser, including 11 critical fixes. Among the critical fixes is for a “us...
https://blog.comodo.com/it-security/mozilla-releases-critical-firefox-security-updates/
Reading Time: 2 minutes If you would really like to be infected by malware, the best place to go these days is amazon.com! According to a quarterly report for Q2 2014 by Solutionary’s Security ...
https://blog.comodo.com/malware/report-amazon-leads-malware-hosts-getting-worse/
Reading Time: 2 minutes We are now more than half way through 2014 and Comodo finds itself in a familiar place in the ongoing Proactive Internet Challenge, conducted by Matousec.com. As has been ...
https://blog.comodo.com/pc-security/matousec-comodos-security-still-tops-years/
Reading Time: 1 minute Microsoft has released a security advisory to address improperly issued SSL certificates that could be used in attempts to spoof content, perform phishing attacks, or perfo...
https://blog.comodo.com/pc-security/microsoft-releases-emergency-update/
Reading Time: 2 minutes In the latest report by netmarketshare.com, the supposedly dead Windows XP actually increased its market share of desktop operating systems slightly, with a 25.3% share. T...
https://blog.comodo.com/pc-security/windows-xp-lives-comodo-still-back/
Reading Time: 1 minute This week’s July security fixes by Microsoft address critical security flaws that users are urged to update as soon as possible. Two of the six security alerts bugs that ...
Reading Time: 1 minute Adobe has released security updates to address multiple critical vulnerabilities in Flash Player and Air that could allow an attacker to steal user credentials and take con...
https://blog.comodo.com/pc-security/adobe-fixes-vulnerabilities-flash-air-sdk/
Reading Time: 1 minute According to a report from Homeland Security, the AVG Secure Search toolbar includes an ActiveX control that provides several unsafe methods that could allow a remote, unau...
https://blog.comodo.com/pc-security/avg-toolbar-makes-ie-users-vulnerable-attack/
Reading Time: 1 minute As scheduled, Apple has released security updates this week for Mac OS X, Safari, iOS devices, and Apple TV to address numerous vulnerabilities. The Safari updates are part...
https://blog.comodo.com/pc-security/apple-releases-critical-security-updates-os-x-safari-software/
Reading Time: 2 minutes Google began complying this week with a European Court Ruling that recognizes an individual’s “Right to be Forgotten” online. The right to be forgotten is a concept ...
Reading Time: 1 minute Microsoft revealed this week that a vulnerability in its Malware Protection Engine could allow an attacker to cause a denial of service. This software is an integral part o...
https://blog.comodo.com/it-security/microsoft-antivirus-numerous-apps-impacted-vulnerability/
Reading Time: 2 minutes The Mozilla Foundation announced this week the release of security updates that address critical a high impact vulnerabilities in Firefox, Firefox ESR, Thunderbird, and Ne...
Reading Time: 1 minute Google has released significant security updates for the Google Chrome browser and Chrome Operating System. User’s are encouraged to apply these updates as soon as possib...
https://blog.comodo.com/pc-security/google-chrome-chrome-os-security-updates-released/
Reading Time: 1 minute This week, Adobe has released security updates to address multiple vulnerabilities in Flash Player and Air. The post Adobe Release Security Updates for Flash Player and A...
https://blog.comodo.com/pc-security/adobe-release-security-updates-flash-player-air/
Reading Time: 3 minutes Comodo, as a matter of company policy, supports education in the United States and provides our security products at reduced rates to meet their security needs. In recent ...
https://blog.comodo.com/comodo-news/educational-institutions-turn-comodo-security/
Reading Time: 2 minutes The case for a containment strategy to defend against malware grew even stronger this week with reports that hackers are using vulnerabilities in Microsoft’s Silverlight...
https://blog.comodo.com/malware/hackers-target-silverlight-deliver-malware/
Reading Time: 1 minute Microsoft Internet Explorer 8 contains a use-after-free vulnerability that can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. By...
https://blog.comodo.com/pc-security/microsoft-internet-explorer-8-vulnerability-requires-upgrade/
Reading Time: 2 minutes Improving privacy and security while browsing has been a major objective for Comodo in recent product releases and enhancements, and a Senate subcommittee report yesterday...
https://blog.comodo.com/malware/senate-report-warns-dangers-online-advertising-malvertising/
Reading Time: 2 minutes We would never advise using an unsupported operating system. Everytime Microsoft issues a security patch for its supported OSs, it provides information that hackers can an...
Reading Time: 3 minutes You may think that cyber-attacks are someone else’s problem. You would be wrong. Cyber-attacks are growing in their number, sophistication and diversity of target. The 2...
https://blog.comodo.com/it-security/advanced-persistent-threats-everyone-risk/
Reading Time: 2 minutes OPSWAT is an independent security firm that provides certifications for security applications to verify that they are compatible with leading network and technology soluti...
Reading Time: 2 minutes The company that made the phrase “You’ve got mail” famous is now saying that if “you’ve got AOL mail” you better change your password and be on the lookout for...
https://blog.comodo.com/it-security/youve-got-spam-aol-data-breach-tied-wave-phishing/
Reading Time: 4 minutes On April 26th, Microsoft revealed that hackers are exploiting a critical vulnerability in their Internet Explorer browser to victimize users with so called “drive by dow...
https://blog.comodo.com/comodo-news/new-vulnerability-threatens-ie-users-comodo-provides-solution/
Reading Time: 3 minutes Identity theft is at a record high, and a significant number of identity theft cases are traced back to spyware. Spyware is a type of malicious software (also called malwa...
https://blog.comodo.com/pc-security/fighting-spyware-firewall/
Reading Time: 1 minute Mozilla is making its Firefox browser SSL verification stronger, and asking for help in making sure it works. Mozilla will pay $10,000 for critical vulnerabilities found in...
Reading Time: 4 minutes It is virtually impossible for the files of known viruses used by conventional scanners to be fully up to date. Independent tester AV-Test Labs recently estimated that the...
https://blog.comodo.com/malware/understanding-containment-malware-defense-real-world/
Reading Time: 2 minutes Phishing is associated with fraudulent activities and stealing personal information on web. The sensitive information including passwords, ID and details of credit cards a...
Reading Time: 1 minute Adobe released a security update today that deals with several critical faults in Flash player and AIR on Windows, Mac and Linux that could allow for third party code execu...
https://blog.comodo.com/it-security/adobe-patches-critical-flash-flaws/
Reading Time: 2 minutes At long last, Windows XP reaches its end of life deadline today. This is the day. April 8th, that Microsoft will release its final security updates for the venerable opera...
https://blog.comodo.com/pc-security/windows-xp-reaches-end-of-the-line-sort-of/
Reading Time: 2 minutes Comodo Internet Security (CIS) is a robust suite of computer security systems, including a firewall and multiple layers of defense against viruses, spyware, malware and ot...
https://blog.comodo.com/comodo-news/comodo-internet-security-7-the-best-gets-better/
Reading Time: 4 minutes Comodo Antivirus Labs has identified a new and extremely dangerous variant of the Zeus banking Trojan. Hackers use Zeus to launch attacks that obtain the login credentials...
https://blog.comodo.com/e-commerce/comodo-av-labs-id-zeus-trojan/
Reading Time: 1 minute Comodo advises taxpayers who file individual income tax returns online through an Authorized IRS e-file provider to be sure that the web site that collects their personal t...
https://blog.comodo.com/pc-security/filing-tax-returns-look-for-the-green-browser-bar/
Reading Time: 2 minutes Millions of Americans are working hard these days to finalize their tax returns before the annual April 15th deadline. With the IRS on our minds, hackers are launching phi...
https://blog.comodo.com/pc-security/is-that-irs-email-really-from-a-phisherman/
Reading Time: 3 minutes If you are confused about what Antivirus protection is provided by Windows, don’t feel bad. Microsoft has changed its strategy and product name several times over the ye...
https://blog.comodo.com/pc-security/windows-defender-minimal-defense-maximum-risk/
Reading Time: 3 minutes Now more than ever before, computer users need to take measures to protect themselves online, and choosing the right antivirus for pc is a key step in defending against cy...
https://blog.comodo.com/comodo-news/5-things-to-know-when-selecting-security-software/
Reading Time: 2 minutes One of the most annoying and often dangerous computer compromises is browser hijacking. You probably have experienced it. A program changes your home page, redirects brows...
https://blog.comodo.com/pc-security/browser-hijacking-dont-be-a-victim/
Reading Time: 1 minute Firefox 28, released on Tuesday, provided numerous important security fixes including 5 for flaws identified in the recent Pwn2Own competition. Pwn2Own is a hacking competi...
https://blog.comodo.com/pc-security/firefox-28-provides-critical-security-patches/
Reading Time: 4 minutes Networks and personal computers are under continuous assault from hackers. The types of attacks vary widely in complexity and severity, but hackers generally have one of...
Reading Time: 4 minutes Tripp Technologies, a four-year-old IT and Web design service provider based in Portland, Me., sold its first install of Comodo Internet Security months before joining the...
https://blog.comodo.com/pc-security/partner-success-story-trip-technologies/
Reading Time: 3 minutes BredoLabs is the name of both a trojan horse program and the largest botnet ever discovered. The botnet has been broken up, for the most part, but variations of the troj...
https://blog.comodo.com/it-security/bredolabs-a-classic-botnet-story/
Reading Time: 1 minute A series of security updates release by Microsoft on March 11th included fixes for a critical security flaw in Internet Explorer 9 and 10 and the next to last updates for W...
https://blog.comodo.com/pc-security/microsoft-releases-critical-security-updates-for-ie-and-windows/
Reading Time: 2 minutes The first protection that your data has is password against online data thieves as well as against the people that intent to steal your data physically. But, if your passw...
https://blog.comodo.com/pc-security/astonishing-leniencies-regarding-data-security/
Reading Time: 2 minutes Worm Autoit AARF comes from the family of Trojan infection which has a long history with the development of computer. Trojan infection targets on all versions of Windows m...
https://blog.comodo.com/pc-security/what-is-worm-autoit-aarf/
Reading Time: 2 minutes Microsoft Windows is the dominant operating system in business organizations for desktops and intranet servers. It is also the number one target platform for hackers. Some...
https://blog.comodo.com/pc-security/windows-systems-6-ways-to-keep-your-network-secure/
Reading Time: 2 minutes More and more unwitting email and Internet users are getting hooked by phishing scams, and it can be painful indeed. Phishing is a scam used by identity thieves to trick y...
https://blog.comodo.com/pc-security/phishing-scams-how-not-to-be-a-victim/
Reading Time: 1 minute Yahoo was the first internet email account I ever used, way back in the late 1990’s. I used that account for my personal email until 2 years ago when my contact book was ...
https://blog.comodo.com/pc-security/yahoo-suffers-email-account-data-breach-again/
Reading Time: 2 minutes What do you do when your network is infected and nothing you do can get rid of the problem? Fetco™ Home Decor, a leading designer and wholesaler of photograph frames, ph...
https://blog.comodo.com/pc-security/case-study-fetco-home-decor-calls-comodo-for-help/
Reading Time: 2 minutes Malvertising The first time I saw the term I thought it was a typo. In fact, it is a term that you will be seeing more because it refers to a growing problem. Criminals an...
https://blog.comodo.com/comodo-news/comodo-dragon-is-armed-against-malvertising/
Reading Time: 1 minute There are some signs that the incredible growth of Facebook has peaked, but with over one billion subscribers it has become a target of opportunity for hackers and fraudste...
https://blog.comodo.com/malware/social-engineering-fake-messages-plague-facebook/
Reading Time: 2 minutes Hardly a day goes by where we don’t learn about a new exploit to a major system that hackers use to wreak havoc on web users. The time has come to think about a new appr...
https://blog.comodo.com/pc-security/browsing-in-the-sandbox-its-time-has-come-with-comodo/
Reading Time: 2 minutes How important is your email communication? Would it be a problem if someone intercepted it? What if someone modified it before reaching the recipient or simply sent email ...
https://blog.comodo.com/pc-security/digital-email-certificates-is-your-email-worth-protecting/
Reading Time: 3 minutes A botnet, a network of unwillingly controlled computers, is sometimes called a Zombie network. That’s because, like “real zombies” the computer owners aren’t awar...
https://blog.comodo.com/it-security/kelhios-the-vampire-of-botnets/
Reading Time: 2 minutes Delivering multiple updates and security fixes, a new version of the popular browser from Mozilla has arrived this week. Firefox version 26 has at least 14 security fixes ...
https://blog.comodo.com/pc-security/firefox-26-delivers-security-fixes-and-plug-and-play-for-java/
Reading Time: 2 minutes The Facebook monitoring system and data analysis technologies have been become very controversial over privacy concerns. They are even being criticized by Tim Berners-Lee,...
https://blog.comodo.com/pc-security/where-has-your-cursor-been-facebook-wants-to-know/
Reading Time: 4 minutes We have the software to do a pretty good job of protecting ourselves from our digital enemies, the hackers who spread viruses and want to steal our personal information....
https://blog.comodo.com/pc-security/are-you-protected-from-your-frienemies/
Reading Time: 3 minutes CryptoLocker, first spotted in September, continues to claim victims of both consumers and businesses alike. The Trojan is a form of ransomware that spreads mainly through...
Reading Time: 1 minute As if we needed it, we have more proof that the black hats never rest. An already notorious exploit kit has been “improved” as a weapon against innocent web users.There...
https://blog.comodo.com/pc-security/watch-your-plugins-silverlight-at-risk/
Reading Time: 2 minutes Adobe has successfully found and patched critical vulnerabilities found in their programs on Windows, Mac and Linux. The popular services from the company including Flash ...
https://blog.comodo.com/it-security/adobe-fixes-flash-player-and-cold-fusion-vulnerabilities/
Reading Time: 1 minute On Tuesday, Microsoft warned that hackers are targeting Windows Vista and MS Office versions 2003 to 2010 to exploit a vulnerability that allows them to take control of the...
Reading Time: 2 minutes You know the web, but do you know the “deep web”? The term “deep web” refers to web pages that are dynamically created and, therefore, not indexed by search engine...
https://blog.comodo.com/it-security/silk-road-rising-the-ebay-of-illegal-goods-gets-second-life/
Reading Time: 2 minutes If you like your operating system you can keep it. But if your OS is Windows XP you might want to think about that.We have known for some time that Microsoft would stop de...
https://blog.comodo.com/pc-security/microsoft-to-leave-windows-xp-users-unprotected/
Reading Time: 2 minutes When it comes to putting any personal or important information out on the internet, beware. You have to assume that it could fall into the wrong hands. You can protect o...
https://blog.comodo.com/pc-security/protect-your-online-privacy-in-three-simple-steps/
Reading Time: 2 minutes Update: check the latest version of Comodo’s free mobile security app A breakout hit TV series is this years is “Agent’s of S.H.I.E.L.D.” about a government organi...
https://blog.comodo.com/mobile-security/project-shield-google-plays-superhero-selectively/
Reading Time: 5 minutes You may have heard of the latest virus, CryptoLocker, by now. The virus is a form of ransomware, a class of malware that, once installed on a system, restricts access to t...
https://blog.comodo.com/it-security/cryptolocker-virus-best-practices-to-ensure-100-immunity/
Reading Time: 4 minutes In The Walking Dead, zombies suck brain matter in a frenzied hunger, completely unaware of what they’re doing – driven only by the need to feed on your brain (and othe...
https://blog.comodo.com/it-security/how-to-survive-a-zombie-apocalypse-on-your-computer/
Reading Time: 3 minutes Protecting yourself online is a never ending battle. In fact, sometimes I wish I did not know so much about the threats to security that are out there. Zombie botnets, fin...
https://blog.comodo.com/pc-security/5-tips-to-choose-the-right-internet-security-software/
Reading Time: 2 minutes Employing encryption strategies needs to be an everyday part of life due to the widespread use of mobile computing and modern storage technologies. It is essential for mod...
https://blog.comodo.com/it-security/deploying-encryption-strategies-in-everyday-use/
Reading Time: 2 minutes Google recently fixed a series of issues within the Chrome browser. At the same time, despite their strong attempts to secure internet transactions, experts agree that Chr...
https://blog.comodo.com/pc-security/experts-speak-out-against-entering-private-data-in-chrome/
Reading Time: 5 minutes “Don’t go upstairs! Don’t open the door! Don’t turn around!” These are the things I say to myself during a scary movie when I hear the token clueless character s...
Reading Time: 3 minutes It’s not only a matter of which came first: Google’s Chrome Apps experience or Comodo’s Virtual Kiosk; it’s also a matter of which virtual platform is superior. Go...
Reading Time: 3 minutes Guest blog post by SolarVPS A few weeks ago, our friends over at Comodo wrote an excellent blog for Solar VPS titled, Five Lessons the League Can Teach Us about Cyber Secu...
https://blog.comodo.com/pc-security/security-is-about-more-than-firewalls/
Reading Time: 4 minutes It happened yesterday. The day we’ve all been dreading since we first saw Walt in his tighty whities. Breaking Bad came to an end. None of us wanted it to happen, but we...
https://blog.comodo.com/pc-security/how-to-break-bad-cyber-security-style/
Reading Time: 3 minutes Cyber security at a university can be a very different challenge than in a corporate environment. With an ongoing wave of cyber attacks, it is past time to beef up the Int...
https://blog.comodo.com/pc-security/universities-go-to-school-on-computer-security/
Reading Time: 2 minutes Google has announced that Chrome will end support for the Netscape Plug-in API architecture, starting with ending support for most plugins in January 2014. This architectu...
Reading Time: 1 minute When considering upgrading to a new operating system your most important question is usually whether the applications you use will be compatible. Nothing is worse than disc...
https://blog.comodo.com/pc-security/windows-8-comodo-perfect-together/
Reading Time: 2 minutes With widespread security concerns over Java vulnerabilities, Oracle released an updated version titled Java 7 last Tuesday. The new standard edition version 7 update 40, J...
https://blog.comodo.com/it-security/oracle-updates-monitoring-security-features-for-java-7/
Reading Time: 3 minutes There is a recent study by the “Anti Phishing Working Group” (APWG) being widely reported that phishing attacks were down 20% in 2012. When I first read about this I t...
Reading Time: 2 minutes With the issues related to NSA a hot topic, the top Internet companies Google, Yahoo and Facebook have now requested permission to publish the number of requests made for ...
https://blog.comodo.com/it-security/nsl-transparency-requested-by-google-yahoo-and-facebook/
Reading Time: 3 minutes The Internet can be a dangerous place to operate. It is increasingly looking like a bad neighborhood when the police are on strike. Even without the criminal element, ...
Reading Time: 3 minutes The internet is a boon for billions of people around the globe that has led to better connectivity, communication, job opportunities and changed the world for good. Howeve...
https://blog.comodo.com/it-security/internet-security-advice-keep-yourself-safe-from-snoopers/
Reading Time: 2 minutes Mozilla Firefox, the most widely known open source best internet browser, has officially rolled out Firefox 24, the latest update with 17 critical security patches to fix ...
https://blog.comodo.com/pc-security/firefox-24-mozilla-releases-a-more-secure-browsing-experience/
Reading Time: 4 minutes Today is Friday the 13th, one of the most unnerving days for superstitious people like myself. You may be picturing the undead mass murderer, Jason, and his notorious hock...
https://blog.comodo.com/pc-security/5-scary-things-you-can-do-to-your-computer-on-friday-the-13th/
Reading Time: 2 minutes People love baby pictures. Now that the Kate Middleton, aka the Duchess of Cambridge has given birth to a royal heir you can bet that the next great surge in Internet traf...
https://blog.comodo.com/pc-security/the-royal-birth-beware-of-those-baby-pics/
Reading Time: 2 minutes Everyone is talking about last week’s Syfi flick Sharknado, the insanely improbable tale of a rain of killer sharks on Los Angeles . A sequel has already been announced ...
https://blog.comodo.com/pc-security/whats-worse-than-sharknado-computer-malnado/
Reading Time: 2 minutes Every computer, laptop, tablet and mobile phone connected to your network represents a vulnerable endpoint for viruses, worms, spyware, rootkits, trojan horses and other m...
https://blog.comodo.com/pc-security/cyber-crime-and-the-case-for-auto-sandboxing/
Reading Time: 2 minutes Did you know that COMODO Internet Security has its own protocol handlers that allow you to perform certain tasks from a web page? The post How to Use CIS Protocol Handle...
https://blog.comodo.com/pc-security/how-to-use-cis-protocol-handlers/
Reading Time: 2 minutes Did you know that if you install COMODO Internet Security 2013, you can get a virtual Chromebook that brings a rich web application ecosystem into your computer with an el...
https://blog.comodo.com/pc-security/virtual-kiosk-101-how-about-a-virtual-chromebook/
Reading Time: 2 minutes Since the official release of our new version we have been gratified by excellent reviews from some of the most respected and widely read resources in technology. The po...
https://blog.comodo.com/pc-security/comodo-internet-security-2013-a-hit-with-the-critics-2/
Reading Time: 2 minutes As of January 18, 2013, the independent tester of security software ranked Comodo Internet Security 2013 Premium (v6) number 1 in tests of 38 internet security suite. More...
https://blog.comodo.com/comodo-news/matousec-comodo-is-number-1-again/
Reading Time: 3 minutes Sure enough, zero-day exploit vulnerabilities have been identified in compromised Java web sites. Oracle has rushed out a patch to deal with these problems, one of which i...
https://blog.comodo.com/pc-security/java-zero-day-exploits-why-i-am-still-not-worried/
Reading Time: 2 minutes You may have heard about a new Java Zero Day exploit that is causing a bit of a panic. Well, “new” is a relative term since Oracle apparently has known about the probl...
https://blog.comodo.com/pc-security/java-zero-day-exploit-why-i-am-not-worried/
Reading Time: 4 minutes It’s pretty clear to most people by now that Antivirus for pc just isn’t doing the job. Not only can you not tell if it’s a three percent success or a ninety percen...
Reading Time: 2 minutes BUKRN9QCD46X The technology of our age has taught us to expect split second results. Your iPhone Apps appear at your command. Your TV Remote gives you any program you wan...
https://blog.comodo.com/pc-security/restoring-pc-speed-without-losing-valuable-files-in-the-process/
Reading Time: 3 minutes By the end of today, it will have happened again. Just like it did yesterday. And will again tomorrow. From the back room of a dank fourth floor walk up in Brooklyn; an el...
Reading Time: 2 minutes With more than 50,000 new malware samples attacking the Internet daily and hackers becoming more and more sophisticated – tracking online behavior, monitoring social net...
https://blog.comodo.com/pc-security/comodo-internet-security-launches-consumer-advocacy-campaign-2/
Reading Time: 2 minutes How do various industries go beyond their marketing messages to convincingly prove their products are worthy of purchase by consumers? One of the most time-honored ways co...
Reading Time: 3 minutes Building the pyramids. Assembling Model T Fords. Manufacturing all the American Military hardware it took to win WWII. Three historic examples of processes that prove an a...
Reading Time: 4 minutes According to Forrester, the world’s preeminent source of statistical data on the Internet, American adults now spend an average of thirteen hours a week on the Web. That...
https://blog.comodo.com/it-security/outshining-chrome-the-comodo-dragon-internet-browser/
Reading Time: 3 minutes No, I don’t mean the 99% of us that Occupy Wall Streeters recently defined as not ready to amass the minimum $344,000 annual income it takes to qualify as a “One Perce...
https://blog.comodo.com/pc-security/print-this-out-and-hand-it-to-one-of-the-99/
Reading Time: 2 minutes Confession may be good for the soul. But it certainly isn’t good for the millions of poor souls using your “hackable” Internet Security products. You can’t make th...
https://blog.comodo.com/pc-security/symantec-and-norton-internet-security-software-is-hackable/
Reading Time: 2 minutes Perhaps you read the press release. If not, here’s a synopsis of what it said. Of the dozen well known Internet Security Software products subjected to the current gaunt...
Reading Time: 2 minutes If you’re the CEO, CFO, or head of IT at a small to medium size company, and your network antivirus subscription will soon expire, I’ve got a question for you: Did you...
Reading Time: 3 minutes Sadly, most Antivirus providers give you more hype than science. And it’s this misguided emphasis that dooms their technology to be dangerously inadequate. At Comodo, we...
Reading Time: 3 minutes Today, viruses prowl the Web in record numbers. And they’re causing slow PC, frozen screens, corrupt files and blue screen in epic proportion. Without a Firewall that bu...
https://blog.comodo.com/pc-security/lax-generation-firewalls-vs-comodos-next-generation-firewall/
Reading Time: 2 minutes These days, every Internet Security product’s marketing effort frames it as the best. Sadly, these astounding claims have become so common place that the public is reluc...
Reading Time: 2 minutes Today, there are two trends that are central to the Internet. First; each year the percentage of the world population that is active on the Internet grows. And second; eac...
Reading Time: 1 minute Glenn Scheuer – If conventional Antivirus software did a good job, millions of PCs wouldn’t get infected with viruses, Trojans and other malware every year. The truth i...
Reading Time: 1 minute Comodo announced that Comodo Dragon, a fast and versatile Internet browser is now available for download. Improved Privacy over Chromium Easy SSL Certificate Identification...
Reading Time: 1 minute Comodo is pleased to announce that results are in on the recent CNET poll on download.com and Comodo Internet Security 5 has been named the company of choice for AntiVirus ...
https://blog.comodo.com/pc-security/cnet-poll-comodo-named-best-free-antivirus/
Reading Time: 2 minutes Credit: www.rd-india.com The post Your Computer is Infected! (And we can help) appeared first on Comodo News and Internet Security Information .
https://blog.comodo.com/pc-security/your-computer-is-infected-and-we-can-help/
Reading Time: 2 minutes Comodo recently announced that its Comodo Antivirus earned the prestigious Checkmark Certification, confirming a high quality of programming by West Coast Labs, a leadin...
https://blog.comodo.com/pc-security/checkmark-awards-comodo-antivirus-certification/
Reading Time: 2 minutes Today, we’re always on the go. For business and pleasure. And millions of us take a laptop, Blackberry or another wireless device with us. To airports, hotels, coffee sh...
Reading Time: 1 minute The Internet is rapidly becoming the world’s No.1 communications medium. Literally hundreds of millions of people are on the Web every day. But not everyone and everythin...
Reading Time: 2 minutes These days, most people find themselves working on their computers or visiting the Web nearly every day. Still, few of us find the time to become very savvy or proficient....
Reading Time: 1 minute One of the largest security breaches is a laptop that is lost or stolen, yet laptops which store confidential business data are the least protected by IT personnel. Protect...
https://blog.comodo.com/pc-security/every-12-seconds-a-laptop-is-lost-or-stolen/
Reading Time: 1 minute We’ve made PCI Scanning easier. Why? Because we know PCI Scanning is a frustrating task for the IT department of any company that must allow credit card transactions. Esp...
Reading Time: 1 minute Comodo Security Systems, Inc., announced today the release of its free Registry Cleaner for Windows PCs. Comodo’s new product is designed to check the registries of Windo...