Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
The passwords were encrypted, but that is usually not enough to stop determined hackers. Adobe reset all current passwords and published a security alert with help for effected customers. They wisely advise customer’s to update their passwords to one that they have not used before and to beware of phishing email scams that pretend to be a reset message from Adobe. Such scams trick victims into revealing their user names and passwords by taking them to a fake web site that looks like the real company and its login or password reset page.
It is very important to understand this is not just about access to your account with Adobe. Increasingly, hackers are taking a highly targeted approach to their attacks. Borrowing from the techniques of “Advanced Persistent Threats” pioneered by nation states, hackers will target very specific individuals to gain access to their organization’s network or to dupe into a financial fraud.
The information stolen from Adobe can be a gold mine for APT attacks. Many, if not most people reuse the same user names and passwords, often with a pattern for varying passwords when they require a change. The bad guys may just be able to derive you online bank login based on your Adobe account credentials.
The Adobe security alert leaves off another aspect of the breach that is also quite troubling. Hackers, presumably part of the same operation, also stole the source code for several of Adobe’s major products, including PDF viewer and Photoshop.
Why would hackers want source code and why should I care? I’m glad you asked me that!
Hackers can use the source code for two purposes. With some products, most prominently Adobe Flash, hackers look for vulnerabilities in the software that they can exploit to spread Trojan viruses Trojans and take over computer. They can also use the source code to spread faux versions of the software that are in fact.
One final thought on this mess.
Companies like Adobe work hard to protect their networks and their data, so breaches are relatively rate. However, when they occur they are bad.
Consider this: In a paper based world it would take a large store room filled with dozens of filing cabinets. It would be tough to sneak out the door with all of that data. You would need a truck to move it all.
However, the stolen file was a “mere” 3.8GB, easily copied using a USB thumb drive! This means that no matter how hard organizations work to shut the door on hackers, the hackers will work even harder. If they can pry that door open, they drive a truck through it!
Tags: Internet Protection,Internet Security,malware,Secure Shopping
Reading Time: 4 minutes Increased dependency on computers and access to data makes an organization more vulnerable to cybersecurity threats. With the increase in cyber-criminals and cyber-attacks, many companies today are looking for greater protection of their decentralized computing work environments from their Managed Service Providers (MSPs). As a result, MSPs need to deliver firewall solutions that are designed…
Reading Time: 3 minutes Rapid technological growth and increasing digitalization in all aspects of life around the world have increased the value of ensuring cyber-security at all levels. This is increasingly true for EU member states and the organizations that are based in or operate from these countries. The number of cyber-attacks targeting EU member states has risen. The…
Reading Time: 3 minutes Disruptions are often unforeseen. This could be a catastrophic event like a hurricane, a fire, or an earthquake. Disruptions, however, can also come in other forms such as that of a pandemic. This means that a building doesn’t necessarily have to be demolished or lives have to be lost for an unforeseen event to completely…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP