Narrow your search
Surf the Internet with a fast, light, and safe browser.
Guard your Windows PC from malware and Internet based attacks.
Detect and destroy malware and viruses.
Provide a versatile technology browser with high level of security and privacy.
Protect PC from viruses, Trojans, worms, buffer overflows, zero-day attacks, spyware, and hackers.
Clean up your system and optimize PC performance.
Surf the Web in a Chromium-based browser with additional productivity options.
Use firewall and antivirus to protection your PC from various harmful threats.
Backup, restore, and secure files swiftly and easily.
Protect your PC from malwares and unsafe programs.
SRware Iron, Comodo Dragon, and Dooble use the Chromium browser engine but promise to protect your privacy better than Google Chrome.
The person (or persons) involved with high-profile intrusion into Comodo's network says he's a 21-year-old cryptographer protesting U.S. foreign policy.
A breach of the Internet's trust system arises from an outmoded method for assuring that a Web site is authentic, and it has browser makers rethinking their approach to security.
A breach that let a hacker spoof digital certificates for Google.com, Yahoo.com, and other Web sites is prompting browser makers to rethink security.
A week after Comodo revealed that one of its registration authorities was compromised and digital certificates were stolen, it discloses that another reseller was compromised.
FBI and Italian police investigate how hacker managed to convince N.J. security firm to issue it digital certificates for Google, Yahoo, Microsoft, other major Web sites.
At the Mobile World Congress in Barcelona, Spain, Israeli start-up Comodo Console debuted a low-cost all-in-one infotainment system that turns any car, including a 10-year-old beater, into a cutting-edge, connected tech sled.
Internet retailer beats Apple and Google to the cloud, while Google settles FTC privacy charges and then gets slammed by Microsoft. Also: Comodo break-in widens.
The Comodo security breach shows that each major browser maker ships a different list of master keys to Web authentication and that each creates its list in a different way.