Reading Time: 2 minutesPhishing is associated with fraudulent activities and stealing personal information on web. The sensitive information including passwords, ID and details...
Reading Time: 4 minutes
Business Challenge
Many customers who are interested in buying a product off a new website feel unsure about the website’s authenticity....
Reading Time: 2 minutes
We have been very proud of the performance of Comodo Internet Security in the Matousec.com “Proactive Internet Security Challenge 64”...
Reading Time: 2 minutes“Comodo’s rise is almost meteoric”.That’s what Neil Rubenking, PC Magazine Lead Security Analyst, wrote about Comodo Internet Security 6 when...
Reading Time: 2 minutesFirst came Symantec and Norton (January 18th Blog). Next up was McAfee (January 20th Blog).
Now it’s VeriSign’s turn.
As hard as...
Reading Time: 3 minutesSadly, most Antivirus providers give you more hype than science. And it’s this misguided emphasis that dooms their technology to...