Cyber Crime and the Case for Auto Sandboxing

Every computer, laptop, tablet and mobile phone connected to your network represents a vulnerable endpoint for viruses, worms, spyware, rootkits, trojan horses and other malicious…

How to Use CIS Protocol Handlers

Did you know that COMODO Internet Security has its own protocol handlers that allow you to perform certain tasks from a web page? This includes…

Virtual Kiosk 101: How About a Virtual Chromebook?

Last week, there was a lot of buzz about the new Chromebook Pixel released by Google. If you haven’t heard of a Chromebook before, it…

endpoint protection

Comodo Introduces Industry Changing Endpoint Security Solution

Comodo announced today their latest solution for centralized administration of security, including anti-virus protection of endpoints. Comodo Endpoint Security Manager 3.0 (ESM 3.0) sets the…

Comodo

Comodo Internet Security 2013: A Hit with the Critics!

Producing a major software upgrade is a lot like producing a Broadway show. You write it, practice in the test lab, then take it “off…

Matousec: Comodo is Number 1, again!

It was with great pride last week that we learned that Comodo Internet Security is once again at the top of the charts in the…

Java Zero-Day Exploits: Why I am STILL Not Worried.

Last Saturday, I was surprised to see a news story that Homeland Security is recommending that all desktop users disable Java.  We just went through…

Malware using your computer to make digital money

Electronic money (e-money) is being used more and more often by people to make online purchases. And sure as night follows day, this means electronic…

Comodo Dome Shield

Password protected archives help malware evade detection

If you need to deliver or store confidential documents over the Internet, then placing them inside a password-protected, self-extracting ‘archive’ is one of the best…

Anatomy of a Trojan: TrojWare.Win32.TrojanSpy.Volisk.a

As part of Comodo Labs’ ongoing analysis of “Digital Signature” (confirming software author and guaranteeing computer program code hasn’t been altered or corrupted since being…

Page 60 of 68« First...102030...5859606162...Last »