Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
In The Walking Dead, zombies suck brain matter in a frenzied hunger, completely unaware of what they’re doing – driven only by the need to feed on your brain (and other body parts). In the computer world, a Trojan can be used to turn your PC into its own oblivious slave –a zombie machine without you even knowing.
Your computer could be operating as part of a botnet, taking part in a Distributed Denial of Service (DDoS) attack, sending out email spam, or spreading malware at this very moment.There are many ways in which your computer can become a zombie, but the most common is through a Trojan installed via a malicious email attachment.
After you open and download a seemingly innocent email attachment, the Trojan runs quietly in the background and allows the attacker full access to everything on your computer.In the spirit of Halloween and the recent Season 4 premiere of The Walking Dead, I thought of some ways we can all survive a zombie apocalypse both online and offline.
Secure all OpeningsFinding secure shelter is vital to surviving a zombie apocalypse, but even the most secure structure can be over-run with thousands of zombies in no time if just one door or window is left open. One zombie gets in, bites 10 people, and before you know it, there are 50 zombies taking over your shelter. I can see it now – blood and guts everywhere.
In a similar fashion, all it takes is one compromised zombie computer to spread mayhem all over the internet. Bad guys can get into your system by exploiting openings or vulnerabilities in your software – especially if you don’t keep it up-to-date. Scary cyber criminals are always on the hunt for these holes so they can get inside and terrorize your computer. The good news is security software providers offer protection in the form of releasing new versions that are less vulnerable to attack. In zombie apocalypse terms, it’s like boarding up the broken door or window to keep it securely closed and keep the zombies out.
Don’t trust anyoneIn a world where zombies thirst for your brain and people are after your food and supplies, you can’t trust anyone that you do not know. Truthfully, you can’t even trust some of the ones you do know. The online world may be even more dangerous than a real-life zombie apocalypse because you can’t physically see the person you’re communicating with online. There’s no way to tell if they’re a cyber criminal intent on installing malware to zombify your computer from behind the screen. In fact, many bots or zombies are unwittingly installed because cybercriminals pose as someone the owner knows. For that reason, it’s important to know the signs to look out for in a social engineering attack, also referred to as a phishing scheme.
1) Don’t download email attachments from unknown senders.a. If you know the source, double check with them and make sure they intended to send it.2) Don’t install pop-ups without first reading the guidelines.3) Don’t blindly click links from untrusted sources.4) If you see a link from your friend (in email, text message, or Facebook post) and it looks strange, don’t click it without first asking your friend if they actually posted/sent the link.
Being a bit paranoid or untrusting can significantly improve your odds in avoiding Zombies both online and offline.
Prevention is KeyZombies are hard to get rid of once they breach your shelter. They seem to multiply faster than you can kill them. Similarly, the rate at which new viruses and malware are reproducing is astounding and traditional security solutions are losing the battle. Detection is no longer enough. Instead, the key to surviving both a zombie apocalypse and a cyber attack is prevention. Don’t wait for zombies to invade before boarding up your windows and securing your doors. Likewise, don’t wait to get a virus on your computer before you install a Windows 10 Antivirus.
With Comodo Internet Security (CIS), you get the best prevention there is – a complete prevention, detection and cure system for your computer. That’s because Comodo Internet Security 6.3 offers 360° protection against internal and external threats by combining a powerful antivirus, an enterprise class packet filtering firewall and an advanced host intrusion prevention system called Defense+.
Once you have CIS installed, all unrecognized applications will be automatically sandboxed and run under a set of restrictions so they cannot harm your computer. This prevents untrusted and potentially malicious applications from damaging your PC or data.
With CIS, NOTHING is getting into your system without your permission.
Follow these simple rules and you’re sure to avoid becoming a victim of a zombie computer attack or getting your brain eaten by real-life zombies. Although, if a zombie apocalypse does actually happen, you’re screwed anyway. In fact, you may want to invest in some zombie apocalypse insurance.
Until then, don’t let your computer become zombified!
Wikipedia DDOS Attack
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP