Generative Data Intelligence

Tag: Trojan

Comodo Technical Report: Android OBAD Trojan Virus

Reading Time: 1 minuteUntil recently, it has been conventional wisdom that the operating systems for mobile devices are much safer than for desktop...

Cyber Crime and the Case for Auto Sandboxing

Reading Time: 2 minutesEvery computer, laptop, tablet and mobile phone connected to your network represents a vulnerable endpoint for viruses, worms, spyware, rootkits,...

Malware using your computer to make digital money

Reading Time: 4 minutesElectronic money (e-money) is being used more and more often by people to make online purchases. And sure as night...

Anatomy of a Trojan: TrojWare.Win32.TrojanSpy.Volisk.a

Reading Time: 5 minutesAs part of Comodo Labs’ ongoing analysis of “Digital Signature” (confirming software author and guaranteeing computer program code hasn’t been...

Antivirus Software – The Art of Denial

Reading Time: 4 minutesIt’s pretty clear to most people by now that Antivirus for pc just isn’t doing the job. Not only can you...

Why hearing someone say, “I broke my computer.” breaks my heart.

Reading Time: 4 minutesWant to have an epiphany? Visit your Town Dump! All across America and throughout many other areas of the industrialized world,...

Why so many Antivirus products fail and Comodo Antivirus does not

Reading Time: 3 minutesSadly, most Antivirus providers give you more hype than science. And it’s this misguided emphasis that dooms their technology to...

Your Computer is Infected! (And we can help)

Reading Time: 2 minutesA window pops up about a legitimate-sounding Antivirus software program like “Antivirus XP 2010” or “Security-Tool,” alerting you that your...

New Russian Botnet Tries to Kill Its Rival!

Reading Time: 1 minuteI recently read something interesting about a new malware. It’s a Trojan that’s been found to add a functionality known...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?