Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
The passwords were encrypted, but that is usually not enough to stop determined hackers. Adobe reset all current passwords and published a security alert with help for effected customers. They wisely advise customer’s to update their passwords to one that they have not used before and to beware of phishing email scams that pretend to be a reset message from Adobe. Such scams trick victims into revealing their user names and passwords by taking them to a fake web site that looks like the real company and its login or password reset page.
It is very important to understand this is not just about access to your account with Adobe. Increasingly, hackers are taking a highly targeted approach to their attacks. Borrowing from the techniques of “Advanced Persistent Threats” pioneered by nation states, hackers will target very specific individuals to gain access to their organization’s network or to dupe into a financial fraud.
The information stolen from Adobe can be a gold mine for APT attacks. Many, if not most people reuse the same user names and passwords, often with a pattern for varying passwords when they require a change. The bad guys may just be able to derive you online bank login based on your Adobe account credentials.
The Adobe security alert leaves off another aspect of the breach that is also quite troubling. Hackers, presumably part of the same operation, also stole the source code for several of Adobe’s major products, including PDF viewer and Photoshop.
Why would hackers want source code and why should I care? I’m glad you asked me that!
Hackers can use the source code for two purposes. With some products, most prominently Adobe Flash, hackers look for vulnerabilities in the software that they can exploit to spread Trojan viruses Trojans and take over computer. They can also use the source code to spread faux versions of the software that are in fact.
One final thought on this mess.
Companies like Adobe work hard to protect their networks and their data, so breaches are relatively rate. However, when they occur they are bad.
Consider this: In a paper based world it would take a large store room filled with dozens of filing cabinets. It would be tough to sneak out the door with all of that data. You would need a truck to move it all.
However, the stolen file was a “mere” 3.8GB, easily copied using a USB thumb drive! This means that no matter how hard organizations work to shut the door on hackers, the hackers will work even harder. If they can pry that door open, they drive a truck through it!
Tags: Internet Protection,Internet Security,Secure Shopping,malware
Reading Time: 3 minutes ‘Tis the season for holiday shopping. Economic forecasters anticipate holiday retail sales will reach a new all-time high in 2019, with U.S. spending set to top $725 billion for the first time in history. The economy is robust, consumer confidence is high, and shoppers are eager to explore great deals and special offers that mark the…
Reading Time: 3 minutes Celebrate National Cybersecurity Awareness Month By Learning to Protect Against Ransomware Attacks It’s the season for pumpkin picking, leaves changing color, getting ready for Halloween parties and trick-or-treating. But ghosts and ghouls aren’t the only scary things you’ll be seeing this month: October is also National Cybersecurity Awareness Month, a time when business leaders and…
Reading Time: 3 minutes Usually summer means vacation and relaxation. But as we’ve seen in recent history, summer plans can be brutally disrupted when cyber threats strike. Just two years ago, the headquarters of A.P. Møller-Maersk, shipping conglomerate in Copenhagen, was virtually destroyed due to infectious malware called NotPetya. On the eve of a national holiday, employees were preparing…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
See how your organization scores against cybersecurity threats