Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
The Comodo Antispam Labs (CASL) team has identified a new global phishing threat, targeted at all businesses and consumers who have Apple IDs – a phishing threat designed to try and steal IDs, passwords and credit card information. Apple has reported it has more than 800 million iTunes accounts.*
The “fake Apple” phishing email looks like an official Apple email having the Apple logo and including Apple physical address listed, as well as an email address that looks to be from Apple officials– giving the recipient the illusion of an email being authentic.
The email tells the recipient that there are some limitations on their Apple account and in order to fix it, the recipient must provide some information in the link provided. When the recipient clicks on the link, it takes them to additional pages with a similar Apple look and feel, asking them to verify credit card information and passwords. This is where the cyber thief steals the information.
The Comodo Antispam Labs team identified the Apple phishing email through IP, domain, and URL analysis, and the Labs’ continuous monitoring and scanning of data from the users of Comodo’s internet security systems.
“The Comodo Antispam Lab is an expert resource of engineers and computer science professionals, who use innovative and proprietary Comodo cybersecurity technology to protect and secure the online world,” Fatih Orhan, Director of Technology for Comodo. “We will continue to work diligently in creating and implementing innovative technology solutions that stay a step ahead of the cyber criminals, and keep enterprises and IT environments safe.”
If you feel your company’s IT environment is under attack from phishing, malware, spyware or cyberattacks, contact the security consultants at the Comodo Antispam Labs: https://enterprise.comodo.com/contact-us.php
The Comodo Antispam Labs team is made up of more than 35 IT security professionals, ethical hackers, computer scientists and engineers, all full time Comodo employees, analyzing and filtering spam, phishing and malware from across the globe. With offices in the US, Turkey, Ukraine, the Philippines and India, the CASL team analyzes more than 1,000,000 potential pieces of phishing, spam or other malicious/unwanted emails per day, using the insights and findings to secure and protect its current customer base and the at-large public, enterprise and Internet community.
Captured from the Comodo Antispam Labs, screen grabs and information on the Apple phishing emails are below.
*data pulled from Apple Shareholders Call, as reported in Forbes.com: http://www.forbes.com/sites/nigamarora/2014/04/24/seeds-of-apples-new-growth-in-mobile-payments-800-million-itune-accounts/
Phishing Screen Grabs and Information
From: Apple <firstname.lastname@example.org>
Reply To: Apple <email@example.com>
Subject: Verify Your Apple ID – AppleID Support
When the recipient hits the “Click Here” link above, it takes them to the following page:
When the victim enters the Apple ID and password and clicks “Sign In,” it takes the victim to the final page, the key pages for the cyber thief – personal information and then credit card information:
This final page gets the credit card information and once the unknown victim clicks “Validate,” the cyber thief has all of their information in hand.
For the System IT Administrators who think their IT may be susceptible to the fake Apple phishing email, the address, malicious URL, domain and IP address to be aware of is below.
Email From Address: firstname.lastname@example.org
Malicious URL inside email: https://srv80.prodns.com.br/~good/my-account/en/
URL Domain : prodns.com.br
IP Address: 126.96.36.199
Tags: Cyber Security,antispam
Reading Time: 3 minutes [Pull quote: In my experience, our customers really appreciate our team’s attention to detail and ability to listen. Here at Comodo, we value professionalism–but we’re also available and friendly.– Stephen Corsale, SVP of Customer Success and Professional Services at Comodo] One thing that’s unique about the cybersecurity industry is that a vendor is successful when…
Reading Time: 3 minutes With cybersecurity playing such an essential role in modern-day business culture, many companies are sourcing highly specialized personnel to help keep their organizations secure. While departmental structures vary from company to company, many would agree a dedicated Chief Information Security Officer (CISO) provides the best bang for buck when establishing sustainable security practices now and…
Reading Time: 3 minutes It can be hard to imagine a world in which an attempted hack attack occurs roughly every 39 seconds. But research shows that’s the world we live in. Some organizations stay in a permanent defensive crouch, running scans and madly installing security patches as needed. While those are good ways to prevent a cyber attack,…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
See how your organization scores against cybersecurity threats