Comodo Mobile Security 2.4: Setting the Standard for Mobile Security

Mobile device security, long neglected by device makers, Internet software makers and end users, is increasingly becoming a high priority. Mobile is the direction of…

Project Shield: Google Plays Superhero, Selectively

A breakout hit TV series is this years is “Agent’s of S.H.I.E.L.D.” about a government organization that protects society against villains with super powers. In…

Comodo Dome Shield

Avoiding Malware in Android Apps

These are exciting times for Android smartphone users, with great new products and so many great apps to choose. Unfortunately, there are risks when installing…

Comodo Mobile Masters Android Master Key Vulnerability

Have you ever heard of the old card trick, the Double Lift? Even a novice magician should have this essential card trick mastered. But for…

Hackers Find Fatal Flaw of Fingerprint Security

When Apple announced the Touch ID technology that rolled out with the new iPhone 5, it sounded like science fiction. Your phone can now be…

anti-spam mobile application

RIP Blackberry?

Once upon a time, the Blackberry from RIM was the most popular and prestigious device to own in the emerging class of products known as…

HP Pwn2Own 2013: Mobile Bugs Earn Big Bucks!

Mobile computing is on a spree and growing at a rapid pace. In order to create a more secure environment for mobile users, the Pwn2Own…

Mobile Antivirus Prevention Top Tips

There are tons of security tips provided online for the average. So much that it can actually be confusing. This is especially true when using…

Mobile Antivirus Adoption Is Low, But Not For Long

An alarming report by the Gartner Group claims that consumers and users are skeptical about using paid Mobile Antivirus software for mobile devices. While desktop…

BitCoin Transactions Vulnerable on Android

The use of BitCoin, digital currency that is not backed by a government,  is on the rise  because it is much more secure than currency…

X