HOME





Comodo Mobile Security
Comodo Mobile Security (CMS) is a mobile application provided free by the Comodo Group that protects Android devices against viruses, worms and scripts. It also features SMS and call blocking, a software and process manager, data and apps backup and data traffic monitor. The anti-theft feature allows users to recover lost or stolen devices. This is the first security app from Comodo, specialists in Internet security, for the Android platform. Comodo Mobile Security requires Android 2.2 and up. Major releases CMS 1.2 * CMS 1.2 was released in April 2012. CMS 2.4 CMS 2.4 was released in January 2014. Major enhancements for CMS 2.4 include: * Cloud antivirus scans. CMS now scans for malware using both local and cloud-based detection engines. * Support for Android KitKat® (4.4). * Added language support for Arabic, Bulgarian, Greek, English, Spanish, Farsi, French, Italian, Polish, Russian, Swedish, Turkish, Ukrainian, and Chinese. * New layout and GUI design offers easier na ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Comodo Group
Xcitium (formerly Comodo Security Solutions Inc.) is a cybersecurity company, including Zero Trust cybersecurity, based in Bloomfield, New Jersey, United States. In 2022, the company rebranded as Xcitium. History The company was founded in 1998 in the United Kingdom by Melih Abdulhayoğlu. The company relocated to the United States in 2004. Its products are focused on computer and internet security. The firm operates a certificate authority that issues SSL certificates. The company also helped set standards by contributing to the IETF (Internet Engineering Task Force) DNS Certification Authority Authorization (CAA) Resource Record. In October 2017, Francisco Partners acquired Comodo Certification Authority (Comodo CA) from Comodo Security Solutions, Inc. Francisco Partners rebranded Comodo CA in November 2018 to Sectigo. On June 28, 2018, the new organization announced that it was expanding from TLS/SSL certificates into IoT security with the announcement of its IoT devic ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Android (operating System)
Android is an operating system based on a modified version of the Linux kernel and other open-source software, open-source software, designed primarily for touchscreen-based mobile devices such as smartphones and tablet computer, tablets. Android has historically been developed by a consortium of developers known as the Open Handset Alliance, but its most widely used version is primarily developed by Google. First released in 2008, Android is the world's Usage share of operating systems, most widely used operating system; the latest version, released on June 10, 2025, is Android 16. At its core, the operating system is known as the Android Open Source Project (AOSP) and is free and open-source software (FOSS) primarily licensed under the Apache License. However, most devices run the proprietary software, proprietary Android version developed by Google, which ships with additional proprietary closed-source software pre-installed, most notably Google Mobile Services (GMS), which ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Call Blocking
Call blocking, also known as call block, call screening, or call rejection, allows a telephone subscriber to block incoming calls from specific telephone numbers. This feature may require an additional payment to the subscriber's telephone company or a third-party. Call blocking is desired by individuals who wish to block unwanted phone calls. These generally include types of unsolicited calls from telemarketers and robocalls. Landlines Unwanted calls to landlines may be blocked through a number of methods. Some landline phones have built-in call blocking facilities. External call blockers are sold as telephone accessories which plug into existing phones. Call blockers and related services recently received attention in 2016 from publications including Which? and Consumer Reports in the United Kingdom and United States respectively. Such devices and services enable the user to block a call as it is in progress or alternatively block the number after the call is made. These ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Software
Software consists of computer programs that instruct the Execution (computing), execution of a computer. Software also includes design documents and specifications. The history of software is closely tied to the development of digital computers in the mid-20th century. Early programs were written in the machine language specific to the hardware. The introduction of high-level programming languages in 1958 allowed for more human-readable instructions, making software development easier and more portable across different computer architectures. Software in a programming language is run through a compiler or Interpreter (computing), interpreter to execution (computing), execute on the architecture's hardware. Over time, software has become complex, owing to developments in Computer network, networking, operating systems, and databases. Software can generally be categorized into two main types: # operating systems, which manage hardware resources and provide services for applicat ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Internet Security
Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet is an inherently insecure channel for information exchange, with high risk of intrusion or fraud, such as phishing, online viruses, trojans, ransomware and worms. Many methods are used to combat these threats, including encryption and ground-up engineering. Threats Emerging Threats Emerging cyberthreats are a result of recent technological breakthroughs. For example, deepfakes use AI to produce audio and video that seems real but are actually fake, which increases the danger of fraud and false information. Furthermore, traditional risks can be automated and strengthened by AI-driven attacks, making them harder to identify and neutralize. Malicious software Maliciou ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


PC Advisor
''Tech Advisor'', previously known as ''PC Advisor'', is a consumer tech website and digital magazine published by Foundry,. Foundry was previously a subsidiary of International Data Group (IDG, Inc.), which was acquired by Blackstone in 2021, but in March 2025 Foundry was acquired by Regent. Foundry also produces ''Macworld, PC World'' and ''TechHive.'' Tech Advisor is a mobile brand, offering reviews and buying advice for the best phones, tablets and wearables, and hacks for improving your life using the technology that is always with you. These applications extend into controlling smart home tech and streaming, which are also covered by the website. Tech Advisor In June 2017 ''PC Advisor'' was rebranded ''Tech Advisor'', which continues to operate as both a website and monthly digital magazine focused on consumer and small business technology buying advice''.'' On 24 August 2020 a formal announcement was made that the Tech Advisor forums would close permanently on Wednesday 2 ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Smartphone
A smartphone is a mobile phone with advanced computing capabilities. It typically has a touchscreen interface, allowing users to access a wide range of applications and services, such as web browsing, email, and social media, as well as multimedia playback and Streaming media, streaming. Smartphones have built-in cameras, GPS navigation, and support for various communication methods, including voice calls, text messaging, and internet-based messaging apps. Smartphones are distinguished from older-design feature phones by their more advanced hardware capabilities and extensive mobile operating systems, access to the internet, business applications, Mobile payment, mobile payments, and multimedia functionality, including music, video, mobile gaming, gaming, Internet radio, radio, and Mobile television, television. Smartphones typically feature MOSFET, metal–oxide–semiconductor (MOS) integrated circuit (IC) chips, various sensors, and support for multiple wireless communicati ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Subscriber Identity Module
A typical SIM card (mini-SIM with micro-SIM cutout)A SIM card or SIM (subscriber identity module) is an integrated circuit (IC) intended to securely store an international mobile subscriber identity (IMSI) number and its related key, which are used to identify and authenticate subscribers on mobile telephone devices (such as mobile phones, tablets, and laptops). SIMs are also able to store address book contacts information, and may be protected using a PIN code to prevent unauthorized use. SIMs are always used on GSM phones; for CDMA phones, they are needed only for LTE-capable handsets. SIM cards are also used in various satellite phones, smart watches, computers, or cameras. The first SIM cards were the size of credit and bank cards; sizes were reduced several times over the years, usually keeping electrical contacts the same, to fit smaller-sized devices. SIMs are transferable between different mobile devices by removing the card itself. Technically, the actual physic ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Comodo Dragon
Comodo Dragon is a freeware web browser. It is based on Chromium and is produced by Comodo Group. Sporting a similar interface to Google Chrome, Dragon does not implement Chrome's user tracking and some other potentially privacy-compromising features, replacing them with its own user tracking implementations, and provides additional security measures, such as indicating the authenticity and relative strength of a website's Secure Sockets Layer (SSL) certificate. Features Upon installation, Comodo Dragon offers the opportunity to configure either the Comodo Dragon or the user's entire computer to use Comodo's own DNS servers instead of the user's Internet service provider. Comodo Dragon performs additional checks on the SSL digital certificates of secure websites, and informs users if a site's certificate may be of insufficient strength. It includes an on-demand site inspector designed to determine if a site hosts malicious code. Instead of Google Updater, Comodo Dragon f ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Comodo IceDragon
Comodo IceDragon is a discontinued Firefox- based open source web browser from the Comodo Group, written for Microsoft Windows. Features * Firefox-based: IceDragon 65 is based on the Firefox 65 codebase. It provides detection for Firefox hard-coded plugin installations. * SiteInspector: Comodo's SiteInspector malware detection system is integrated into IceDragon. SiteInspector's link scanning feature checks whether a web page is malicious. * SecureDNS service: IceDragon offers Comodo's Secure DNS Service to users as an alternative to using their Internet Service Provider. This is intended to produce faster page loads and safer browsing because SecureDNS references a real-time block list (RBL) of malicious websites. See also * Comodo Cybersecurity * Comodo Dragon – based on Chromium/ Google's Chrome, also from Comodo Group * Comodo Internet Security * Comodo System Utilities * Comodo Mobile Security Comodo Mobile Security (CMS) is a mobile application provided free by the C ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Comodo Internet Security
Comodo Internet Security (CIS) is developed and distributed by Comodo Group, a freemium Internet security suite that includes an antivirus program, personal firewall, sandbox, host-based intrusion prevention system (HIPS) and website filtering. Version history Release 5 In CIS 5.0 cloud antivirus protection and spyware scanning capabilities were added. As it could not clean all the malware it found effectively, Comodo Cleaning Essentials was developed to supplement CIS. Host-based intrusion prevention system: Comodo's host-based intrusion prevention system (HIPS), named Defense+, is designed to provide protection against unknown malware. It is designed to restrict the actions of unknown applications, and restrict access to important files, folders, settings and the Windows Registry. Defense+ by default refuses any unknown program to install or execute except when specifically allowed by the user or when the file appears on Comodo's whitelist. In CIS 4.0 a sandbox was added ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Comodo System Utilities
Comodo System Utilities, also marketed as Comodo PC TuneUp, is a software suite by the Comodo Group, a software company known for Internet and network security software. Overview Comodo System Utilities combines three cleaning utilities: Registry Cleaner, Disk Cleaner, and Privacy Cleaner. It includes the following programs: * Windows registry cleaner: Identifies, removes or repairs any corrupted entries or files * Disk cleaner: Frees up disk space and improve performance * Privacy cleaner: Deletes cookies, cache and history * SafeDelete: A trademarked product that deletes files that are determined to be safe to delete. Comodo System Utilities requires Windows XP, Vista or 7 and can be downloaded for free. Reviews * January 15, 2014, ''PCMag ''PC Magazine'' (shortened as ''PCMag'') is an American computer magazine published by Ziff Davis. A print edition was published from 1982 to January 2009. Publication of online editions started in late 1994 and continues . Over ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]