10 Results for



Comodo IceDragon

Surf the Internet with a fast, light, and safe browser.

5 stars Editors' rating on Aug 6, 2013
4 stars Users' rating out of 30 reviews
download now
535,228 total downloads
2,788 last week

Comodo Firewall

Guard your Windows PC from malware and Internet based attacks.

4 stars Editors' rating on Jun 1, 2014
3 stars Users' rating out of 268 reviews
download now
1,527,014 total downloads
610 last week

Comodo Antivirus

Detect and destroy malware and viruses.

5 stars Editors' rating on Jul 29, 2013
3 stars Users' rating out of 52 reviews
download now
568,731 total downloads
719 last week

Comodo Dragon

Provide a versatile technology browser with high level of security and privacy.

3.5 stars Editors' rating on Sep 30, 2014
4 stars Users' rating out of 202 reviews
download now
423,011 total downloads
1,042 last week

Comodo Internet Security Premium

Protect PC from viruses, Trojans, worms, buffer overflows, zero-day attacks, spyware, and hackers.

4.5 stars Editors' rating on May 16, 2014
4 stars Users' rating out of 2109 reviews
download now
3,586,602 total downloads
1,000 last week

Comodo System-Cleaner

Clean up your system and optimize PC performance.

5 stars Editors' rating on Jan 3, 2010
3.5 stars Users' rating out of 127 reviews
download now
174,048 total downloads
107 last week

Comodo Chromodo

Surf the Web in a Chromium-based browser with additional productivity options.

3.5 stars Users' rating out of 12 reviews
download now
94,058 total downloads
1,949 last week

Comodo Internet Security (64-bit)

Use firewall and antivirus to protection your PC from various harmful threats.

3 stars Users' rating out of 10 reviews
download now
46,703 total downloads
84 last week

Comodo Backup

Backup, restore, and secure files swiftly and easily.

3 stars Users' rating out of 32 reviews
download now
33,063 total downloads
24 last week

Comodo Cleaning Essentials

Protect your PC from malwares and unsafe programs.

4 stars Users' rating out of 1 reviews
download now
31,582 total downloads
22 last week

Three privacy-focused browsers compared

SRware Iron, Comodo Dragon, and Dooble use the Chromium browser engine but promise to protect your privacy better than Google Chrome.

By December 20, 2013


Comodo hacker says he's protesting U.S. policy

The person (or persons) involved with high-profile intrusion into Comodo's network says he's a 21-year-old cryptographer protesting U.S. foreign policy.

By April 4, 2011


Behind Comodo hack, an insecure Web (roundup)

A breach of the Internet's trust system arises from an outmoded method for assuring that a Web site is authentic, and it has browser makers rethinking their approach to security.

By April 4, 2011


Comodo hack may reshape browser security

A breach that let a hacker spoof digital certificates for Google.com, Yahoo.com, and other Web sites is prompting browser makers to rethink security.

By April 4, 2011


Comodo: Web attack broader than initially thought

A week after Comodo revealed that one of its registration authorities was compromised and digital certificates were stolen, it discloses that another reseller was compromised.

By March 30, 2011


FBI probes Comodo Web security breach

FBI and Italian police investigate how hacker managed to convince N.J. security firm to issue it digital certificates for Google, Yahoo, Microsoft, other major Web sites.

By March 29, 2011


Comodo Console makes any car connected

At the Mobile World Congress in Barcelona, Spain, Israeli start-up Comodo Console debuted a low-cost all-in-one infotainment system that turns any car, including a 10-year-old beater, into a cutting-edge, connected tech sled.

By February 14, 2011


Amazon's head in the cloud (week in review)

Internet retailer beats Apple and Google to the cloud, while Google settles FTC privacy charges and then gets slammed by Microsoft. Also: Comodo break-in widens.

By April 1, 2011


Why browsers differ on Web sites' safety

The Comodo security breach shows that each major browser maker ships a different list of master keys to Web authentication and that each creates its list in a different way.

By March 28, 2011