Monthly Archives: April 2014

Mobile Security-How to Keep Your Mobile Phone Safe

From time and again, great innovations have propelled mankind to another level. One such invention, mobile phones, took man to the pinnacle of communication. Considered a boon to modern civilization, mobile phone technology is growing at a fast rate as does mobile malware. As per a recent report, Androids are 3 times more vulnerable to malware than they were few months ago. The report further said that nearly 50% of Android users don’t use screen passwords. Your mobile stores personal data, contacts, videos, important files, and more. Therefore, it is imperative to protect it from hackers and malware. With an antivirus for android, you can protect your device from Trojans, spyware, and adware, But even after installing the best mobile anti-virus app, there are other precautions you should take to ensure your data is safe.

imagesUse Strong Passcodes:

Strong passwords are a simple but the best way to keep your information safe.
Use numbers, characters, special symbols, and capitalized letters in your password such that it is difficult for hackers to access your system.
Avoid staying signed into social media networks, online bank accounts, or other apps that store your information, for a long time. Log out immediately, once your work is done.

Use different passwords for different email accounts. Using just one passcode for all the accounts is unsafe as hackers can easily crack open it.

Keep your Antivirus App updated:

Installing a strong antivirus software is the most effective way to safeguard your mobile device from malicious threats.
The app detects and deletes viruses and malware.
The other benefits of a mobile security software include phone locating through Google maps, and wiping or locking functions.
Major security vendors offer free antivirus for android for a period of time. If your are satisfied, you can go ahead and buy the complete version.

Comodo Mobile Antivirus is one of the best mobile antivirus available today.

Try new version of Comodo Mobile Antivirus mobile antivirus now.


Install Apps only from trusted source:

Apps are the main pathways through which viruses and malware enter your device.

Do not download any app just because it sounds exciting. Do a thorough research on the app before installing.
Download apps only from trusted sources such as Google Play store and Amazon. These sites scan for any malicious threats regularly.

Beware of Public Networks:

Public Wi-Fi and computers are the breeding grounds for hackers. So, refrain from logging on public Wi-Fi areas.
Public computers and Wi-Fi are devoid of mobile security software. Therefore, switch off your network connection in public places.

Apart from the above mentioned precautionary techniques, other essential ways to secure your mobile include preventing jailbreak, surfing only on trusted sites, constantly updating the OS, and encrypting the device to name a few.

Your mobile phone is more than just a phone. It is a audio/video player, web portal, HD camcorder, gaming device, a GPS system— it’s a big list. Therefore, compromising its security is tantamount to compromising your security.

Leave a comment

Posted by on April 25, 2014 in Antivirus


What is the Difference Between Anti-virus and Anti-malware

The term ‘virus’ refers to any malicious code that replicates and spreads by infecting files and usually gain access as email attachments rendering the system inoperable or deleting your files. In simple terms, virus is a type of malware that is designed to cause havoc on your files. On the other hand, the word ‘malware’ (malicious software) is a broad term that describes all types of malicious or unwanted programs such as worms, viruses (active, contained, inactive), Trojans, rootkits, adware, nagware, spyware, and PUP(Potentially Unwanted Programs). A malware is more menacing than a virus because it not only messes up your files (viruses), but can steal personal information (spyware), hold your system for a ransom (scareware), infect through networks (worms), or enter disguised through the system’s backdoor (Trojans).

From a historical perspective viruses were the first dominant malware form to emerge in the 1980s, when PCs were becoming common place. Malware is a relatively new term, discovered only in 2006, and was completely unheard of back in those days. So, any malicious program was called a virus and the name stuck. With the emergence of newer markets, cyber criminals began to drive a change giving viruses the opportunity to evolve into the different dangerous programs we know today.

A program that prevents, detects, and deletes viruses is called an anti-virus software and a program that protects a system from any malware is an anti-malware software. The key difference between antivirus and anti-malware program is their functionality. For example, consider a scenario in which a virus-laden file is downloaded and run activating the virus. Some anti-virus programs may have basic or simple tools to delete active viruses, but today’s malware is more sophisticated and clever hiding on an infected system only to be re-initiated later. So, the AV program may not completely clean the infections, whereas an anti-malware software consists of tools that specifically remove malware out of the infected system, should a virus somehow filters through the anti virus check.

Another major difference between antivirus and anti-malware is that a virus scanner should be run at all times to inspect web traffic and catch viruses, while a malware scanner can either be run via user interaction or at a predetermined time.

An anti-virus software is of two types : on-access program and on-demand program. The former  is a primary tool that actively scans your system and monitors all your activities while you browse the net ensuring you don’t click or download anything malicious. The latter is a secondary tool that conducts an in-depth scan of every file on your system. If a malware goes undetected by the on-access scanner, the on-demand scanner will find and remove it.

Malware exists in different forms such as hidden or partially corrupted file, virus initiating mechanism, or as a third party aiming to steal valuable data. An anti-virus software alone cannot keep your system 100% safe.  A strong anti-malware software is needed to completely remove the virus package. Whatever program you choose, don’t assume that the anti-malware or anti virus will protect you from viruses and malware. Go through the features of the software you choose carefully, have all your bases covered, before deciding.

Leave a comment

Posted by on April 7, 2014 in Internet Security


Top Antivirus softwares that helps in protecting your linux system

Regardless of the operating system, computers can suffer from viruses and malware. Linux is no exception this but is fortunate to have only few viruses to trouble it. This is precisely why most Linux users do not have an anti-virus software installed. But, just like other OS, it is recommended that Linux users install a malware removal tool on systems that have data being transferred to a device or that are on a network. According to some users, the antivirus uses way too many resources. Fortunately, low-footprint applications exist for Linux OS. Though, Linux malware infection is not as widespread as Windows infection, the amount of viruses and malware targeting the OS has risen in recent times.

According a 2005 report, Linux malware has doubled from 420 to 850. Though when compared to Windows malware it is a miniscule percentage, it is still a cause for concern.

Virus Scanners

Virus scanner is a security application that searches the system for any malware. The scanner looks out for specific code patterns or certain malware characteristics before deleting the malware from the system or instructing the user on what should be done with the malicious program. There are quite a few tools that remove malware effectively from Linux OS. They are:

Comodo Antivirus for Linux

1. This is one of the best malware removal software available today and has been trusted by individuals and enterprises alike. This powerful anti virus and email filtering program detects and deletes viruses and malware from Linux-based computers and laptops.
2. It acts as a gateway to emails blocking spams and email-borne malware keeping information safe.
3. It has an array of features including cloud, on-access, and on-demand scanning.
4. The software is simple to use, easily configurable, automatically updates virus definitions.
5. Along with these great features, it also includes a detailed event viewer, a scan scheduler, and a custom profile scanner.
6. The software is available for free and can be downloaded from Comodo’s website.



1. ClamAntiVirus is a popular Linux antivirus software designed to detect and remove malware and other malicious threats.
2. It is a command-line AV program providing multi-threaded scanning and automatic updates in addition to being free and an open source.


1. Kaspersky antivirus for Linux is new program that provides adequate protection against dangerous programs.
2. It keeps data secure and scans files when they are opened.
3. Data updation is followed a on regular basis.


1. Another popular malware removal tool, Avast has more features, like the Sandbox applications, in its paid version.
2. It is not open source and utilizes system memory for its functioning.
3. Users argue that this software offers better protection than ClamAV.


1. Anti Virus guard offer quick scanning and prevents the entry of online scams and scammers.
2. It prevents data theft and spying and keeps the system running smooth.
3. Unlike, AVG Windows, AVG Linux has no graphical user interface (GUI).

Though Linux OS has only a few known viruses, there are many unknown on the rise. Therefore, it is paramount that Linux users install one of the best malware removal software to protect their systems.

Leave a comment

Posted by on April 3, 2014 in Antivirus


Tags: , ,

Why Comodo antivirus is the best tool for blocking CryptoLocker virus?

CryptoLocker, also nicknamed ‘ransomware’, is the latest weapon invented by cyber criminals  to extort money from the users. Unlike the other online scamming techniques, this tactic is less scheming and more profitable. CryptoLocker virus is a new type of malware, a Trojan Horse, predominantly distributed via emails to infect the system, encrypt the files, and demand ransom for the decryption key from victims. A new variant called CrptoLocker 2.0, discovered in December 2013, is significantly more potential than its predecessor encrypting more file formats and propagates via USB drives. It renders Windows Key, Escape (Esc) Key, and ALT+TAB features inaccessible.

With an impressive record of infecting more than 300,000 systems within a short span of 3 months, CryptoLocker virus 2.0, alias Prison Locker, found its match in Comodo Endpoint Security Manager (CESM). The software detects and prevents threats by segregating safe and unsafe applications. It then isolates all applications whose legitimacy cannot verified. It it is a known threat, the anti-virus will prevent from damages. If it is an unknown threat, Comodo’s unique Auto-Sandbox feature and the Host Intrusion Prevention System (HIPS) will block and prevent it from infecting the operating system. Therefore, before CryptoLocker becomes a menace, CES automatically sandboxes it preventing encryption of files.

Get complete details about How to defeat this virus from your pc at

The Comodo Enterprise Security Manager 3 (CESM) is for a fact unprecedented because it is only anti-malware program that offers 5 layers of  in-depth defense (HIP, Firewall, Anti-virus, Auto-Sandbox, and File Rating) to the impact point (desktop). This effectively means that your system is 100% secure from CryptoLocker virus. The fact that Comodo Antivirus installations have crossed 70 million with a clean record is a further emphasis on the strength of the software. Comodo also provides CESM users with $,5000 free warranty against virus.

The Endpoint Security Manager provides a powerful anti-malware that effectively coordinates threat protection on endpoints (local and remote) from a browser-based console. This design assists system administrators to centrally manage their desktops, laptops, and server endpoints. So, when an user clicks on a malicious message that contains CryptoLocker virus, the ESM detects and sandboxes it automatically and alerts the admin. The administrator will first view the files in the sandbox, select the malicious programs, remotely access end user’s system, select the malicious application running on sandbox, and delete it. Easy to say and simple to execute.

In November 2013, the US-CERT warned of an impending rise in CryptoLocker, but also assured that organizations using CESM were guaranteed to stay and be protected. Powered by the same technology as Comodo Internet Security (CIS), CESM possess other potentials such as centralized monitoring known and unknown files (sandboxed and malicious), encrypted VNC sessions to endpoints (local and remote), auto-synchronization of endpoint through Active Directory, and Windows 7 Embedded (standard version) support.

CryptoLocker ransomware is a grave threat and is on a rapid rise. What you need is not just protection but a ‘stubborn’ protection against it. With a proven track record in security services, Comodo Endpoint Security Manager is undoubtedly the best choice.

Leave a comment

Posted by on April 2, 2014 in Internet Security


Tags: , ,