Mobile Antivirus Prevention Top Tips

There are tons of security tips provided online for the average. So much that it can actually be confusing. This is especially true when using…

Mobile Antivirus Adoption Is Low, But Not For Long

An alarming report by the Gartner Group claims that consumers and users are skeptical about using paid Mobile Antivirus software for mobile devices. While desktop…

BitCoin Transactions Vulnerable on Android

The use of BitCoin, digital currency that is not backed by a government,  is on the rise  because it is much more secure than currency…

Comodo

Comodo Mobile Antivirus Defends Against Malware From Ad Networks

Online ad networks are reliable communication mediums that reach a mass audience and support quality and popular web content. However, they are being exploited by…

Black Hat 2013: An Inside Look into Mobile Security

The Black Hat 2013 conference held at Las Vegas a week ago was an eye-opener for security experts and common users. A slew of hackers,…

Mobile Antivirus and E-Authentication

With the surge in mobile phone market and the necessity to facilitate electronic authentication methods, consumers have started rely on the platform. Because of this…

Network Penetration Testing: The Extra Mile

When is a bad guy not a bad guy?  When he is your friend pretending to be a bad guy in order to protect you.…

PCI DSS Compliance: Failure is Not an Option

There is an epidemic of identity theft and financial fraud hat is costing businesses and consumers millions of dollars per year. Most of these incidents…

AV-TEST June Results: Comodo is Perfect Protection for Windows 7

“Comodo’s rise is almost meteoric”. That’s what Neil Rubenking, PC Magazine Lead Security Analyst, wrote about Comodo Internet Security 6 when examining the results of…

Cyber Attacks

Why is Mobile Security Integral In Modern Era?

Times have changed and what used to be luxury is now a necessity for most people. Computers have evolved from the huge machines of the…

X