Why Website Security Matters And How To Check?

clean joomla website
Reading Time: 3 minutes
website security check

Websites – especially business websites – present a lucrative option for hackers. Websites – especially business websites – present a lucrative option for hackers. They deal with money and sensitive customer data, which, when website security is compromised, can put enterprise reputations at stake.

Simply put, your website security matters. It’s your job to check your website security status from time to time by employing the right testing methods and security tools. If you don’t, your e-business will be in grave danger before you even realize it. Therefore, in this blog, let’s look at how both of these tasks can be accomplished.

How to Check Website Security?

  1. Application Login Testing
  2. Contact Form Testing
  3. Credential Encryption Testing
  4. User Session Testing
  5. Testing Against Popular Website Attacks
  6. Access Permission Testing

By Employing Website Testing Methods
This is also known as website or web application penetration testing. Here you employ a group of trained professionals – known as ethical hackers – to test your website security. These people understand the weak points of your website very well and by testing them, make your website strong enough against various security attacks.

Some of the website security tests they conduct include:

  • Application Login Testing: One of the most critical areas of your website or application, which when compromised, can expose sensitive user information to hackers. Also, basic website security tests like account lockout after a specific number of unsuccessful login attempts should be tested.
  • Contact Form Testing: This is another area which needs to be tested for security issues. Enterprises often make the mistake of not testing contact forms properly, since they are not critical when compared to other elements. This is the wrong approach, and contact form testing should be a part of any website security testing process.
  • Credential Encryption Testing: This type of testing ensures the integrity of the credential encryption process you employ – the one which ensures user credentials are transferred securely over the internet (using https) without falling into wrong hands.
  • User Session Testing: Another test for ensuring the integrity of user sessions. That is, ensuring technicalities like session termination immediately after users log out, session termination after prolonged user inactivity and other such things.
  • Testing Against Popular Website Attacks: Probably the most important of all. This is where ethical hackers will simulate popular website attacks like Brute-Force, DDoS, SQL Injection and others, and check how your website fairs against these attacks. They will give you advice to improve your security accordingly.
  • Access Permission Testing: Ensure you provide hierarchical based access permission to your website. For example, the webmaster team should probably have full-access permission while others should be provided only role-based access. Nothing more or nothing less. Since this is one of the areas which can be easily exploited.

By Using Website Security Tools:
Apart from these testing methods, there are other ways to test your website security as well, with the help of various online website security tools. These tools, within a matter of minutes, test the security posture of your website and alert you to any security threats which may exist.

But while subscribing to the services of such website security tools, enterprises should be wise enough to select only those which are the best in the industry, like our very own web inspector. Otherwise, you’ll get the wrong idea about the security posture of your website.

Comodo Web Inspector Offers:

  • Daily Malware Scanning – for checking viruses or malware infections. You will be notified immediately when a problem is discovered.
  • Blacklist Monitoring – for checking your website’s online reputation by performing an exhaustive blacklist monitoring check to ensure your website is not blacklisted by major search engines like Google and Yahoo. You will be notified immediately if you’ve been blacklisted.
  • PCI Compliance Scanning – Web Inspector also incorporates a full-fledged PCI Scan Compliance solution powered by HackerGuardian.
    This will enable you to understand the extent to which your business website complies with PCI standards (extremely crucial for online merchants). (Not available with the basic version*).
  • Trust Seal and 24/7 Phone Support – You also get a Web Inspector Scan trust seal using which you can visually communicate to your customers your website is safe, secure, verified and can be trusted. This will give them the confidence to revisit your website. Then there’s the 24/7 customer support as well. (Both of these features are not available with the basic version*).
  • Perform Your Website Security Check Using Web Inspector. Keep Your Website Malware Free.

Website Malware Scanner

Related Resources:

Free Online Website Scan for Vulnerabilities

How Comodo Advanced Threat Protection Works?

Advanced Threat Protection
Reading Time: 2 minutes

Advanced Threat Protection

Cyber threats are evolving at an exponential rate and are becoming more challenging to control. Wide-ranging security vulnerabilities, faster and more sophisticated cyber attacks are all making it extremely difficult for security experts to prevent zero-day threats.

Nowadays, savvy hackers are using advanced methods to hack networks, faster than most businesses can defend against. Hackers hijack organizations and use their own corporate networks for personal gain. Organizations are beginning to implement Defense-in-Depth strategies to thwart attacks. Comodo Dome, a Cloud-based Secure Internet Access suite includes five layers of strong defense when it comes to internet-based threats.

Comodo Dome is an advanced threat protection suite that leverages containment technology to prevent zero-day attacks from gaining access to organizations’ networks. The Comodo Dome suite includes DNS Filtering, Secure Web Gateway, Antispam, Data Loss Prevention, and a Virtual Appliance Firewall.

How Comodo Dome Works?

DNS Filtering: Control desktop, laptop, and mobile device access to malicious and inappropriate Internet domains.

Secure Web Gateway: Protect against every kind of threat and ensure strict compliance with policies – without slowing down your users.

Data Loss Prevention: Monitor and control the movement of sensitive and confidential data across the network.

Firewall: Guard your trusted internal network against infiltration from untrusted external sources.

Anti-spam: Remove spam and malicious email traffic before it enters your network while protecting your users from zero-day threats.

Advanced Threat Protection: Comodo’s advanced threat protection is integrated into the Dome Suite to protect users from all known and unknown internet-based threats. Traditional security will only protect users from known bad threats. Comodo’s advanced threat protection contains all unknown threats while analyzing them instantaneously to provide a verdict 100% of the time. Along with the advanced protection, users are still able to access files in real-time, therefore not hinging employee productivity. Along with this approach, Comodo’s containment technology is incredibly lightweight and uses less than 1% of CPU.

In todays sophisticated and evolving cyber world, organizations are embracing digital transformation to compete. Along with this comes many risks. By protecting networks with a defense-in-depth endpoint protection strategy and advanced security when embracing digital transformation, organizations can grow and expand successfully.

Be proactive, rather than reactive to conquer digital transformation to grow. Implement the five layers of the Comodo Dome Suite into your security portfolio today!

Related Resource:

Are You One of the Millions Secretly Victimized by Cryptojacking?

Reading Time: 4 minutes


Bitcoin… Blockchain… Cryptocurrency… and Now Cryptojacking!

I know what you’re thinking… I have nothing to do with these technologies, why should I care?

As of March 2018, the market cap for cryptocurrencies surpassed $264 billion and has become the new bull’s eye for cybercriminals.

And the bottom-line is… if you have a website, then you need to know how to protect your website and its visitors from hackers.

Cryptocurrency, Mining, and Cryptojacking 101

Nearly everyone has heard of the surge in value of cryptocurrencies such as Bitcoin, Ethereum, Monero, and Zcash. But what is the relevance of mining cryptocurrencies and how does it really affect me?

With regular money, there is a central bank that authorizes the issue of new notes and like any man-made system, it is prone to corruption.

Enter the world of digital money, aka cryptocurrency, designed to be absolutely secure and anonymous.

Cryptocurrencies allow users to make secure payments without having to go through banks.

Generated through a process known as ‘mining’, or cryptomining, transactions are verified and added to the blockchains (digital ledgers) to prevent deception, fraud, corruption, and the like.

The verification of these blockchains require serious CPU power to the extent of an entire warehouse with computers from floor-to-ceiling and the titanic electric bill that follows.

As payment for these huge costs, cryptominers are paid cryptocurrencies as fees by the merchants of each transaction.

Sounds pretty fair, right? Payment for services rendered.

Well it sounds pretty fair to cybercriminals too, minus the warehouse, minus the hardware, and minus the electric bill.

This is where you come in and this is where you get cryptojacked!

These cybercriminals target computers, servers, and networks, in order to mine for cryptocurrency using your resources such as websites, computers, and electricity.

Basically, you pay for the resources and they reap the financial benefits, to the tune of millions of dollars!

On April 4th, 2018, an unknown hacker attacked the Verge cryptocurrency platform. The attack lasted a miniscule three hours, but unofficially reported that the attacker stole a whopping $1,373,544. Since then, the firm has updated the system with a patch to prevent further exploitation.

How a Cryptojacker Infiltrates

There are several ways cryptojackers infiltrate a victim’s computer to secretly mine cryptocurrencies.

One way is to use phishing tactics in which a link is clicked that runs code for cryptomining script in the background.

To make matters even worse, now with in-browser cryptojacking, a program does not need to be installed. Once you visit this infected website, the script automatically executes malicious code.

Cryptojacking requires no download, starts immediately, and is completely unnoticeable.

The undetectable nature by which it performs makes it the new stealth bomber of the cyber threat industry.

In either case, the malicious code running stealthily on the victims’ computers, stealing CPU resources, and secretly mining cryptocurrencies for the hacker.

bitcoin attack

Danger to Website Owners and Their Visitors

Cryptojacking is dangerously effective and with the recent rise of Bitcoin, cybercriminals are redirecting their focus away from ransomware in favor of cryptocurrency mining.

Even Google is seeing a tremendous surge in Chrome extensions running cryptocurrency mining scripts.

In swift response, the Chrome Web Store is no longer accepting any extensions that run mining scripts extensions.

In its latest report, The U.K.’s National Cyber Security Centre, emphasizes cryptojacking as a “significant” concern.

The report noted that 55 percent of businesses worldwide suffered from cryptomining attacks last December.

The agency added that “we assume the majority of cryptojacking is carried out by cyber criminals, but website owners have also targeted visitors to their website and used the processing power of visitors’ CPUs, without their knowledge or consent, to mine cryptocurrency for their own financial gain.”

Therefore, once your webpage is identified as delivering cryptojacking scripts, whether intentional or not, you will face a number of issues, including blacklisting, customer mistrust, and revenue loss.

Massive Impact of Cryptojacking

The most recent quarterly report from Comodo Cybersecurity Threat Research Lab stated: “During Q1 2018, Comodo Cybersecurity detected 28.9 million cryptominers incidents”. Also noting that, “cryptocurrencies have become a favorite target of cybercriminals”.

Furthermore the report outlined the number of unique cryptominer variants grew from 93,750 in January to 127,000 in March, as shown in Fig. 1 below. At the same time, ransomware activity decreased 42% from 124,320 to 71,540 from January to March.

cryptojacking impact

No one knows for certain how much cryptocurrency is mined through cryptojacking, but it definitely doesn’t require significant technical skills. According to the report from Digital Shadows, “The New Gold Rush Cryptocurrencies Are the New Frontier of Fraud”, cryptojacking kits are available n the dark web for as little as $30.

Is There a Cure for Cryptojacking?

Cryptojacking is clearly a significant concern for 2018 and the only way a user may notice their devices are being cryptojacked is a slowdown in performance.

Since this happens to most of us at one point or another, it will leave us questioning… have I been cryptojacked???

As these attacks are continuously evolving and still in their infancy, one of the better solutions would be real-time monitoring of your website.

Yet who has the time or the knowledge?

There are a few organizations with the network and the monitoring tools or the capabilities to analyze that information for accurate detection.

One such service is cWatch Web and it’s backed by human intelligence and a team of cybersecurity analysts. So don’t get cryptojacked! Protect yourself and your website with continuous monitoring and protection.

Don’t count on your existing endpoint protection tools to stop cryptojacking. Crypto mining code can hide from signature-based detection tools and desktop antivirus tools won’t see them.

And since you don’t have a help desk or can’t train your help desk to look for the signs, deploying a monitoring solution might be your best bet to detecting cryptomining activity.

Day 2: RSA Conference

Comodo Cybersecurity
Reading Time: 4 minutes

rsa 2018Without human intervention, a stone is just a stone. But when it is lifted and placed within a broader structure, like a winding country wall, it becomes a boundary, a landmark, a work of art. And when it is wielded with anger against another person, it become a dangerous weapon, capable of inflicting injury or even death. Technology is precisely the same. Like the quiet stone, it is neutral and without feelings or judgement—despite its ability to wreak havoc. Albeit not from the natural world, technology is simply an extension of our human capability and a symbol of the future we envision for ourselves. But at the end of the day, both the simple rock and the not-so-simple devices we use every day are still just a means to an end; they can bring about our oppression or our liberation—the choice is ours.

Many would say digital inventions like social media have improved our lives to a large degree, but as a resource, they have also become increasingly difficult to control. This morning at RSAC 2018, one of Comodo Cybersecurity’s resident experts, Dr. Kenneth Geers, reminded everyone in his presentation, POTUS Is Posting: Social Media and National Security, these social platforms have recently been weaponized against the very people they were designed to entertain. Much like the mythological figure of Phaethon, who insisted on driving the sun chariot despite his lack of equestrian skills, human beings have clearly overestimated the manageability of such a dynamic resource. And just as Phaethon lost the reins of his powerful horses, we too are poised to scorch the Earth with our ignorance and lack of digital foresight. Computer networks are now commonplace in geopolitical conflict, and the rapid evolution of cyber threats makes it challenging for defenders to keep up. If the cybersecurity world does not acknowledge this reality in a timely fashion—and with a cogent, compelling strategic plan—the cyber-battlefield of 2020, just two years from today, may feasibly overwhelm the usability of the internet.

Cyber Battle Field

As a senior research scientist at Comodo Cybersecurity, Geers paints a fascinating picture that is both futuristic and entirely plausible. “Connectivity is the most important thing to think about. We have laid the foundation for one world government via the internet.” The hardware is in place, the systems have been designed, and now we must focus on the not-so-controllable element of human behavior, which will likely pose the biggest threat to our success. History tells us man has always been his own worst enemy, and it seems not much has changed. The internet has paved a road to the creation of a virtual civilization, full of digital citizens from all corners of the planet, which leaves every country, every government, every community, and every single person vulnerable.

Social media is not necessarily a modern invention—it has been around for some 40,000 years, as is demonstrated by the hand stencils found painted on the walls of Paleolithic and Neolithic caves. People have been looking for ways to connect and share their existence with others since the dawn of man—that is nothing new. But instead of marking our lives through cavernous wall art, we do it through Facebook, Instagram, and Snapchat, posting pictures and ideas in place of dusty handprints. As a result of this evolution, we have essentially created one cyberspace and one new nation in the form of social sharing. This history is evidence of our inherent need to see and be seen by others, something we clearly cannot live without, and yet the question of who exactly is charge of this all this data is not entirely clear. If it is truly such a valuable part of our human exchange, we must figure out better ways to protect our information from being used as a platform for criminal warfare.Cyber Warfare

In all likelihood, the window into a safer future shows more focus on biometrics, virtual reality, and blockchain technology to regulate and control this digital civilization we are destined to create, but there will also be considerable need for IT that supports these underlying approaches. Comodo Cybersecurity, as is demonstrated through the wise words of Dr. Geers, is already well on its way to finding such solutions through advanced endpoint protection, managed detection and response, secure cloud and internet access, and fully managed security services. Yes, increased awareness around privacy and personal data is critical, but at the end of the day, the technological solutions like those of Comodo Cybersecurity will be the only way to mitigate the ongoing weaponization of our digital resources. Having a weapon is one thing, but if you can’t use it—well, it doesn’t really matter. At Comodo Cybersecurity, we know certain malicious human behavior will likely never disappear entirely—and weapons of some kind will always be available—which is precisely why we must find new ways to render them useless.

Comodo Cybersecurity

Comodo Cybersecurity Achieves the Gold Standard SC Award for Best Managed Security Service

Managed Security Service
Reading Time: 2 minutes

With breaches happening every day, it is not an easy task for customers to stay ahead of hackers. This is especially true for organizations with limited internal resources. Comodo Cybersecurity has been recognized for their dedication and commitment to protect the world from attacks and vulnerabilities that threaten our security, privacy, and digital infrastructure.

SC Media Awards are recognized as the industry gold standard of accomplishment for cybersecurity professionals, products and services. Comodo Cybersecurity has been awarded the 2018 SC Award for Best Managed Security Service for their Comodo ONE, the free IT management platform.

Comodo Cybersecurity’s free integrated IT and security management platform for managed service providers (MSPs), combines remote monitoring and management (RMM), ticketing and patch management into a single, easy-to-use console. It helps MSPs automate existing processes and view real-time data and alerts from customer networks, reducing operating costs and improving the quality of service.

What sets Comodo Cybersecurity apart?

Here’s how Comodo ONE has set the bar so high:

It’s free. It’s the only complete IT and security management platform that provides IT management tools for free. 140,233 endpoints+ are managed by Comodo ONE. Plus, it will be free forever.

Integrates with numerous add on applications. This is what makes Comodo ONE free. MSPs have the options to buy a range of additional network security and endpoint management applications.

Reduces overall costs and drives efficiency. MSPs who leverage the money they save from licensing and additional costs can reinvest in their business with the latest unique technology, additional staff, and greater operational efficiency.

Standardize and automate existing processes. MSPs can also view real time data and alerts from customer networks ultimately reducing operating costs and improving quality of service.

Year-round 24/7 customer support. Comodo Cybersecurity is constantly revising and upgrading its platform to include new functionality and enhancements based on feedback it receives from its tight-knit user community.

Strong return on investment. It also stimulates new business with subscription-based services for new and existing customers and expands customer bases with a scalable, open platform.

As a company that is transforming cybersecurity with protection for endpoints, networks and web servers that is proven to be effective against the most advanced malware threats, Comodo Cybersecurity is honored that SC Media recognized its success in enabling customers to protect themselves through its managed security service.

What is Endpoint Protection?

Related Resources:

How To Improve Your Company’s Cyber Security Readiness

Why you’re putting your network at risk with a defensive approach to malware

The Seven Advantages of Hiring a Cyber Security Provider

Cyber Security

Cyber Security Solutions

Usability or Bust: Day Four

rsa 2018
Reading Time: 4 minutes

rsa 2018

Sometimes life just doesn’t make sense. As humans, we are capable of creating and implementing so many remarkable things, and yet we often struggle to make the most basic connections. From the great pyramids of Egypt to the voyage of Apollo 11 to the theory of relativity, mankind has demonstrated the ability to craft innovations that go far beyond the obvious limitations of body and mind. Even more, they have proven their capacity to create solutions for every avenue of life, especially as it pertains to the advancement of their livelihood. But for some reason, organizations around the world are still struggling with many aspects of cybersecurity, from writing bug-free code to establishing effective regulations. True, the rules of cyberspace are different from those of the physical world—and yes, we are currently embroiled in an unprecedented digital revolution… And yes, the nodal nature of a lightning-fast network makes controlling its boundaries difficult, but still. Can’t we make computers easier and safer to use?

VP and Principal Scientist at Comodo Cybersecurity, Dr. Phillip Hallam-Baker, believes we can. This morning, in his RSAC 2018 presentation, Why Did We Make Security So Hard?, he approaches the subject with startling simplicity. Usability. “The only security application we can expect users to use is one that demands nothing from them.” We all know an easier computer interface equates to better cybersecurity, especially for those folks who don’t know the difference between a router and firewall, so perhaps the solution isn’t so elusive after all. Provide people with clear, efficient, and intuitive systems, and they will handle them more appropriately as a result. Of course, educating people is always a smart decision, but the truth is most of the population is far too busy trying to complete their own online work to sit and ponder the security of their network or their email or their social media. They have their own fish to fry, as it were.


As Hallam-Baker reminds us, “secure applications and their features usually don’t get used because they require the user to be thinking about security,” when what they want to be thinking about is buying a microwave on Amazon or meeting their boss’s deadline. So, while technological responses to cybersecurity are obviously critical, understanding the inherent responses of human users is equally as valuable. Why does someone need to go through 17 different steps to enable S/MIME encryption (and click an extra button every time a message is sent) when in theory the process could be completed with far less effort? The point is, they don’t. “We have to strip out all unnecessary steps in securing data and make encryption the default and not the exception.” Combining this simple approach with effective managed security services, like those implemented by Comodo Cybersecurity, is a sure-fire way to create systems that are both safe and highly usable.

As long as we continue to treat cybersecurity as just a technical problem, and not a design one, we will continue to fail. But if we can honestly address the results of usability testing—thereby defining the efficacy of our products, applications, websites, software packages, or devices—the goal of improved usability and security is fully attainable. By shifting our focus to the optimization of UI designs, work flows, and user understanding, we can learn more about how people and systems can come together to achieve real progress. The data collected from usability labs can provide engineers with ideas for future innovation that speaks to the need for improved security and human understanding. This effort includes identifying issues with products and paying attention to how users:

  • Complete specific tasks
  • Meet usability objectives
  • Feel about the overall experience
  • Complete tasks within a set time period

The bottom line is, computers are smart and can do a lot of the heavy lifting for us. So, why make usability hard on the user? Hallam-Baker tells us, “any instructions you can write for the user can be turned into code and executed by the machine,” which makes perfect sense. Handing over the more complex actions to the computer-side of the exchange is a far better option that establishing unrealistic expectations for people who won’t (and often can’t) meet them.

Digital certificates

The hypothesis fleshed out through Hallam-Baker’s presentation asserts that is is possible to solve any security usability issue by introducing an additional layer of PKI. This set of roles, policies, and procedures supports the distribution and identification of public encryption keys and enables users and computers to securely exchange information over networks, thereby identifying the identity of the other part. Without this system, sensitive data could still be encrypted and shared but it could not confirm authorization. Digital certificates sit at the heart of PKI because they are what affirms identify of the certificate subject and binds that identity to the public key. As a solution layer, the Mathematical Mesh is a cloud repository for configuration data. Mesh tools pull configurations from the cloud and makes devices run properly with no user effort. This affects security because it automates the administrative process and implements security with minimal compromise and error. As a security tool, strong end-to-end encryption works internally to enable stronger application management of email, web, and SSH.

While this is not the only solution to the larger question of how to simplify usability, it provides clarity around just how feasible it would be to change the way we think about computers and how we interact with them. Yes, innovating new technology is always going to be an essential part of our digital evolution; however, strange as it sounds—we will likely never reach the stars if we don’t also remember our own limitations.

comodo cyber security

Day 1: RSA Conference 2018

Cyber Security 2019
Reading Time: 5 minutes

There’s no better time than the present, or so they say. And when it comes to protecting sensitive data and finding increased guardianship in the digital age, this adage has never felt more true. Looking around at today’s online threats, one thing becomes perfectly clear—the realm of cybersecurity has become, hands down, one of the most relevant and dynamic fields in the modern world. For anyone paying attention, the emergence of malware attacks on networks of all kinds has been a stark reminder of the critical need for a strong defensive posture, in both our personal and professional lives. From social engineering to the hacking of IoT devices to the spread of computer viruses, the news has been fraught with tales of unprecedented breaches and the growing demand for industry solutions.

For cybersecurity experts around the globe, the time is now to meet these challenges with determination, skill, and a big dose of collaboration. And right on cue, just when the scales began to feel forever tipped towards lawlessness, the RSA Conference of 2018 has appeared on the scene once again to remind us all that intelligence, expertise, and a strong commitment to integrity is still alive and well in cyberspace. And Comodo Cybersecurity will be there in force to share its vision of a more secure future and how our unique proactive technology can make that goal a reality. As Comodo Cybersecurity expert Dr. Phillip Hallam-Baker reminds us, technology developed in 90s has been largely ignored because the problems they solved had not yet emerged. “But now, it’s time to go back and see what we have in the toolbox and how they can be applied.”

The RSA Conference theme this year— “Now Matters”— highlights a key concept in information security today. No matter how you slice it, our digital landscape has taken on an unprecedented level of urgency and pressure. Cyber threats have begun to feel bigger, scarier, and more devastating, ushered in by the realization that current solutions are just not robust enough to handle this evolution. As Illinois Board of Elections Executive, Steve Sandvoss, poetically stated in a recent interview to 60 minutes, his IT department’s effort to battle the recent Russian cyber attack on the U.S. voting system was nothing more than “bows and arrows against the lightning.” Threat analysis tells us there is no waiting for tomorrow to address these types of cyber-threats; our safety and livelihood hangs in the balance. And now all eyes are on the cybersecurity industry to make the necessary changes and find the creative strategies to come out on top.

As a top innovator in the field, Comodo Cybersecurity understands this timeline and the need for a vigorous yet realistic approach. Yes, internet technologies have revolutionized the way people communicate and do business, but they have also created ongoing risk and the demand for trust. As a principle, Comodo Cybersecurity believes all users have the right to a safe and secure digital environment, an experience that can only be ensured through proactive software solutions. With the emergence of more and more malicious actors, establishing trust in the digital realm will require more than just an assurance—it will demand proof. And this is precisely why Comodo Cybersecurity containment technology is so effective. It enables systems to analyze all file types, including potentially harmful ones, and find a definitive verdict in less than one minute. Voilà. Trust established.

Attended by approximately 43,000 people, the week-long RSA event held this year at San Francisco’s Moscone Center kicked off this morning with a strong focus on education, risk management, compliance, and the need for organizational diversity. With a wide range of expert keynotes, including upcoming sessions with Comodo Cybersecurity’s Dr. Kenneth Geers and Dr. Phillip Hallam-Baker, there was no shortage of discussion around pivotal issues like trust, online privacy, and future ethics. As principal scientists for Comodo Cybersecurity, both Geers and Hallam-Baker will be using their expertise to heighten awareness around future strategies and the need for improved alliances in cyberspace.

Dr. Geers will be conducting three dynamic sessions this week at RSA, each one specifically targeted at learning more about the cyber-war we face and how it can be vanquished:

  • Cyber-Comrades: Alliance Building in Cyberspace: The first of three presentations, this discussion will focus on the fascinating ways our cultural history and national sovereignty have been affected by nation-states, and how our military, political, and economic alliances have formed as a result. Of course, these realities have done much to shape the IT challenges of today, with regards to data collection, information, and global intelligence. As we move into the next phase of our cyber reality, the way the world’s countries handle digital diplomacy, cyber laws, and all government-related organization will have a massive impact on the future of the internet. Tuesday, April 18th @ 1pm.
  • POTUS Is Posting: Social Media and National Security: Sure, we’ve been telling our kids for years about the need for increased safety online, but the U.S. president? It would seem so. After Russia’s recent manipulation of the 2016 election and Trump’s arsenal of reckless tweets, it has become painfully clear just how powerful social media has become in the digital landscape. For nation-states looking to spread their influence, social media has become not only a platform for crime, espionage, terrorism, and war—it has also become one of the most dangerous weapons in the world today. Tuesday, April 18th @ 8am.
  • Cyberwar on a Shoestring: How Kim Jong Un Stole My Malware: The internet is for everyone, not just those superpowers who wield the biggest keyboard. And someday soon, smaller nations and even non-state actors will find new ways to harness digital strength for their own purpose. This increase in usage will essentially create a cyber-battlefield where reverse engineering, re-weaponization of malware, and APT digital strategies will take center stage. The question is, are you ready? Tuesday, April 18th @ 2:15pm.

On a more cryptographic note, Dr. Hallam-Baker will be discussing the security applications and challenges users face in today’s digital world:

  • Why Did We Make Security So Hard?: Great question! Using his mathematical mesh theory as a foundation, Dr. Hallam-Baker will explore concepts around making computer use easier and more secure. If digital security is too unwieldy and difficult to use, the reality is people won’t use it—so even some measure of mediocre security is better than nothing at all. He will present innovative solutions related to personal PKI, key escrow, and offline master root, all of which can be effectively used to improve application profiles.
    Thursday, April 19th @ 8:30 am.
  • Two Keys Are Better Than One, But Three Keys Are Better Than Two: While sharing how the use of three or more key encryptions could have stopped breaches of massive organizations like the NSA and the CIA, Dr. Hallam-Baker will also offer insight into the next generation of public key protocols and how proxy re-encryption can be effectively applied. Friday, April 20th @ 9am.

And for those who aren’t worn out after a week of pondering the world’s digital security, there will be book signings, sandbox competitions, drinks and hors d’oeuvres, plenty of information security vendors to check out, including Comodo Cybersecurity, and even an RSAC bash on Thursday evening from 6-10pm. Learning, networking, and enjoying the industry’s most talked about event of the year should be on everyone’s calendar this week!

Comodo Cybersecurity Q1 2018 Global Malware Report: cybercriminals follow the money, cryptominers leap ahead of ransomware

Comodo Cybersecurity
Reading Time: 3 minutes

In Q1 2018, Comodo Cybersecurity Threat Research Labs’ experts analyzed 300 million malware incidents worldwide and witnessed the sharp rise of cryptomining attacks, a surprising decline in ransomware, increasingly sophisticated password stealers and malware patterns that coincided with escalating geopolitical tensions. Let’s take a closer look.

Cryptomining Attacks Change: Follow the Money

Comodo Cybersecurity’s Global Malware Report Q1 2018 report is among the industry’s first presenting new 2018 information for the quarter just ended.

Current threat analysis shows a very different picture from 2017. During the first three months of 2018, cryptominers surged to the top of detected malware incidents, displacing ransomware — which declined significantly in volume — as the number one threat.

As bitcoin jumped in value up to $20,000 in 2017, it became a prime target for cryptomining attacks. The real surge, however, came this year as cryptominer attacks grew to 28.9 million, amounting to a 10% share of all malware incidents during the first quarter. The number of unique cryptominer variants grew from 93,750 in January to 127,000 in March.

Another surprising finding: altcoin Monero now has the dubious honor of being the leading target for cryptominers’ malware, replacing Bitcoin. The reasons why hackers prefer cryptomining and love Monero, and how these attacks work, are detailed in the full report and the infographic.

Ransomware Declines Dramatically, as Attackers Shift Strategy

The 2018 data shows criminal attention to mining seems to have come at the expense of ransomware activity, for which new variants fell from 124,320 in January to 71,540 in March, a 42% decrease.

While ransomware represented 4 out 10 of all malware detections in August 2017, it declined to less than 1 in 10 in February 2018. Attacks are less successful because attackers have not innovated malware code and companies have adopted anti-ransomware measures, such as virtualizing infrastructures. Comodo Cybersecurity believes that ransomware will reemerge as a major threat, possibly as a weapon of data destruction, as demonstrated by NotPetya. The report dives deeply into how ransomware attacks work and explains why companies should be concerned about a resurgence.

Password Stealers are Becoming More Complex and Dangerous

Comodo Cybersecurity experts have witnessed the rise of sophisticated password stealers, with the Pony Stealer Trojan the leading choice for malware payload. Cybercriminals are motivated by financial factors, as world wealth increases and online banking accounts are linked to cryptowallets.

Password stealers like Pony Stealer penetrate a victim’s computer, covertly extract secret information and cover their traces to avoid detection. This topic is covered extensively in the report

Geopolitical Tensions Rise Globally, Changing Malware Patterns

In Q1 2018, the U.S., Russia and China made the news on the geopolitical scene. For an analysis of key events and how they correlated with threat patterns, please download the Q1 2018 Threat Report or the infographic.

Q1 2018 Threat Report Infographic

Comodo Cybersecurity will host a webcast to discuss the findings with Dr. Kenneth Geers, chief research scientist at Comodo Cybersecurity on Wednesday, May 9, 2018 at 1 p.m. EDT (register here).

About the Comodo Cybersecurity Global Malware Report

The Comodo Cybersecurity Threat Research Labs’ Global Malware Report: Q1 2018 summarizes global malware patterns, providing business and technology decision makers with critical insights they can use to improve enterprise security. This publication is a quarterly threat report published by Comodo Cybersecurity Threat Research Labs, a group of more than 120 security professionals, ethical hackers, computer scientists and engineers who work for Comodo Cybersecurity full time analyzing malware patterns across the globe. Comodo Cybersecurity is a division of Comodo Security Solutions Inc., a global innovator of cybersecurity products for the enterprise.
What is Endpoint Protection?

Related Resources:

How To Improve Your Company’s Cyber Security Readiness

Why you’re putting your network at risk with a defensive approach to malware

The Seven Advantages of Hiring a Cyber Security Provider

Cyber Security

Cyber Security Solutions

Comodo is The Best AV for PCs for February 2018

Reading Time: 2 minutes

Comodo AV Test

AV-TEST, an international cybersecurity research body, honored Comodo Antivirus as the best antivirus product for Windows PCs for the month of February. Comodo AV bested its competitors in a battery of tests conducted by AV-TEST to measure a security product’s protection, performance, repair, and usability.

The tests, which AV-TEST conducts on a monthly basis in order to detect the latest forms of malware and to analyze them using state of the art methods, use publicly available versions of anti-viruses. The researchers simulate real-world scenarios meaning they run the AVs against a gamut of the latest malware while testing how the products’ processes affect a computer’s resources.

Comodo edged out other players in the Windows PC environment by garnering scores of 100% in the detection of known threats and 100% in prevention of malware zero-day attacks. AV-TEST researchers gave Comodo a 5.5 Performance rating out of a possible 6.0 because of its relatively minimal impact on a computer’s speed. Finally, Comodo AV garnered a perfect 6.0 Usability score because it only blocked legitimate software once out of the 51 runs researchers tried the product. Comodo AV only also showed a single instance of false detection after scanning 1,514,806.

This positive review from the independent malware research organization is a welcome sign for Comodo and one which may also portend for good things to come. The cybersecurity solutions company provides a suite of products with a strong focus on proactively denying threats from gaining footholds on systems. Proof of this can be found in a leaked CIA document bemoaning Comodo AV 5.0’s near impenetrable defense against hacks.

Comodo Antivirus is a product of Comodo Group Inc with headquarters in Clifton, New Jersey. Please download Comodo Antivirus for free here.

Related Resources:

Antivirus for Linux (PC)

Comodo Cybersecurity’s Consumer Antivirus Named “Top Product” by AV-Test

Top Comodo Antivirus
Reading Time: 2 minutes

We’re excited to announce that Comodo Cybersecurity’s consumer anti-virus product was named a “Top Product” by the AV-Test Institute, an independent IT security and AV research organization. Our anti-malware capabilities have been tested, validated, and proven to be a top solution for endpoint users.

The AV-testing categories consist of Performance, Protection, and Usability to determine how each product performs against current online threats. Comodo scored a 6.0/6.0, which concludes that our product protects against malware attacks 100% of the time, including email and web-based threats. It also revealed 100% detection rates of rampant malware within the last 4 weeks.

Comodo Internet Security Premium was thus recognized as one of the best Antivirus Software for Windows Home – a “Top Product”.

This recognition in particular is one we are extremely proud of, as our antivirus product is powered by the same underlying security engine that also powers Comodo’s Advanced Endpoint Protection (AEP) – our anti-malware solution for businesses. Our AEP uniquely renders malware useless through our innovative auto-containment technology. With containment, all unknown executables are “locked” in a virtual container, while our Valkyrie cloud-based threat analysis platform analyzes the files and provides an accelerated verdict in less than 45 seconds 95% of the time, of either known “good” or known “bad”.
What is Endpoint Protection?

With the commonality across our “Top Product” consumer free antivirus and our Advanced Endpoint Protection, we’re confident that Comodo Cybersecurity can render malware useless, for both consumers and businesses alike!

Related Resources:

How To Improve Your Company’s Cyber Security Readiness

Why you’re putting your network at risk with a defensive approach to malware

The Seven Advantages of Hiring a Cyber Security Provider

Cyber Security

Cyber Security Solutions