Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
Surely there are very few in the US, or among Internet-connected citizens elsewhere, who are not aware of the massive security breach suffered by Yahoo in 2013, but only recently acknowledged by the company. And it is really not as much the company that “suffered” the breach, as much as customers and consumers.
In a general sense, anyone who uses the Internet on a regular basis was affected, if only by the knowledge that such a massive breach is indeed possible. To look at the possible “silver lining” to this dark cloud, perhaps this will serve as a much-needed wake up call for all those netizens with a laissez-faire attitude about passwords and Internet security in general.
Comodo’s own Kenneth Geers, who has had years of experience in the cybersecurity industry, both public and private, had much to say about the Yahoo news.
“Yahoo should know that it is an invaluable target for cybercrime syndicates and nation-states and invest the resources to protect its data accordingly,” said Geers, senior research scientist at Comodo. “The use of vulnerable MD5 hashes suggests that Yahoo was not paying sufficient attention to security.”
As malware and cyberattacks, and even more so, ransomware incidents, have been increasing dramatically in the last few years, there is also escalating public awareness of the importance of cybersecurity. While the effects of cybercrime simply for financial gain cannot be downplayed, there are often other, more insidious motives.
“This is a hack of strategic scale, conducted with a high level of anonymity; those two factors combined could mean that this is a foreign intelligence service seeking the information solely for its signals intelligence value,” Geers added. “One way to test that hypothesis is to try and find out if the stolen information has been used for cybercrime; that, however, is no guarantee because leaking some information could be a deceptive tactic on the part of the attacker. The fact that it may be unconnected to the 500-million account hack in 2014 does not change this calculus; there are many intelligence services in the world who might be responsible.”
Many recent high-profile cyberattacks have been attributed to nation states, as opposed to random, individual hackers. Recent statements released by the FBI and CIA indicate their willingness to attribute the widely-publicized hacking of the Democratic National Committee to Russia, for example, even suggesting a possible Russian hacking influence in the recent US presidential election.
And the Yahoo extreme breach is indicative of yet another lurking threat…the possibility that hackers, nation-state or otherwise, can potentially have a dangerous impact on national, even global, financial circumstances.
“It is possible this type of cybercrime could be used to affect market share; when billions of dollars are at stake,” noted Geers. “We shouldn’t forget that an insider, a rival corporation, or even a nation-state might operate purely out of selfish financial considerations. All of these individual data items could be used equally well for intelligence or criminal purposes.”
The list of possible consequences goes on.
“It is possible that other hacks have benefited from the Yahoo cases since users often reuse passwords between sites, and their security questions might be the same,” Geers said. “Such incidents will increase the pace of developing real-time biometrics for online authentication.”
Clearly, there are dramatic steps to be taken. Not only do average consumers need to be aware, to take steps to protect themselves, but companies large and small need to wake up to the possibility that they are only a click away from becoming the next Yahoo, a fate that can damage a company’s reputation, at the very least.
But there are solutions, and Comodo has them. To discover your company’s vulnerabilities, sign up for Comodo’s free forensic analysis: https://enterprise.comodo.com/freeforensicanalysis
Tags: cybersecurity,yahoo breach
Reading Time: 4 minutes Increased dependency on computers and access to data makes an organization more vulnerable to cybersecurity threats. With the increase in cyber-criminals and cyber-attacks, many companies today are looking for greater protection of their decentralized computing work environments from their Managed Service Providers (MSPs). As a result, MSPs need to deliver firewall solutions that are designed…
Reading Time: 3 minutes Disruptions are often unforeseen. This could be a catastrophic event like a hurricane, a fire, or an earthquake. Disruptions, however, can also come in other forms such as that of a pandemic. This means that a building doesn’t necessarily have to be demolished or lives have to be lost for an unforeseen event to completely…
Reading Time: 4 minutes There should be no doubt in anyone’s mind that the coronavirus pandemic will reshape our education systems. It has already altered how students around the world learn and share knowledge with their peers in just a matter of months. Those changes can give insight into how education will progress in the long run, for better…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP