1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 4.00 out of 5)
59227 views
Published on August 19th, 2009

Find out how you can get immediate feedback on suspicious (and possibly viral) files and applications from Comodo.

Comments (3)

Comments

admin

October 26, 2009

7:25 pm

Andy: using strong security software like Comodo Internet Security is a great start. Watch Melih Abdulhayoglu’s videos on comodo.tv (Top nav bar M-Vision) He comments frequently on emerging threats and what to do about them. We also try to post the best Internet Security videos on the net. Check out the Comodo.TV community channel for programs that discuss the broad range of Internet Trust and Security.

andy morrison

October 20, 2009

2:24 am

being new to p.c’s and after months of trying to learn i finanly have some help. I am a disabled student and omly one question.why or how have i been hacked twice and what steps should i take to prevent this in future ?
Thank you for shareing your vision of a safer internet.

Royce

August 20, 2009

8:28 pm

Also, people should be informed that Comodo offers a third way to submit suspicious files for review/submission for addition to the av database. The Comodo Instant Malware Analysis (CIMA) allows for users to submit files to Comodo and get a result as to the status of the file (is it viral or not). If you suspect the file is malicious, you can then submit the file via http://internetsecurity.comodo.com/submit.php. I have used this feature in the past and love the response time and follow up via email from the Comodo staff.

Add new comment

Your name
Comment

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

*