Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
According to the noted National Security expert Bill Gertz, White House computers have been compromised by hackers, probably from China, but nothing classified was stolen. (Washington Free Beacon, 9/30/12)
Who says nothing classified was stolen?
Well, an administration official and an unnamed source on background. (Politico, 10/2012)
Well, that’s good then. Government officials always tell the truth.
Exactly what was hacked into? An email system.
Whose email system? It was just the White House Military Office.
Great! Not like they got into the West Wing and were monitoring the Prez’s love letters to Michelle or his iPod playlist!
So, what exactly does the White House Military Office do?
They are in charge of the President’s Nuclear Football. I know, he is more of a golf and basketball guy.
But this is a very special football. It has the codes that the President could use to launch nuclear missiles and start World War III. And they also arrange the Presidents travel and communication plans!
That may sound serious, but not to worry!
An Administration National Security official says it was just a “Spear Phising Attack”. That’s where a hacker uses emails disguised as from a trusted source in order to get recipients to reveal classified information or become infected by malware. (Washington Free Beacon, 9/30/12)
Sounds bad, but the Administration official also said such attacks are “not infrequent” and there are unspecified “mitigation measures in place”.
I guess they know what they are doing. This is the US Government, after all.
But wait! He said this is “not infrequent”!
That means it happens a lot!
I sure hope they are using Comodo Internet Security Pro 2012, the best Antivirus and firewall software!
Most malware protection systems use a “blacklist” of known threats to screen files. The problem with this approach is that the list has to be constantly updated and they can’t protect against threats not yet identified. As former Defense Secretary Donald Rumsfeld once said, the thing that you keeps you up at night are the thing that you don’t know and you don’t know that you don’t know them!
With 40,000 new malware unleashed every day it is a lot of work maintaining a blacklist.
Comodo antivirus system uses a “whitelist” approach. The scanner uses a list of known valid programs to allow only safe programs to run in the system. For any other software it allows it to run in a separate, isolate system called a “sandbox”. The scanner monitors the program in the sandbox and can identify if it is safe or not.
If the White House has trouble with computer hackers than everyone is at risk. Never open email if you have any suspicions as to the source and use Comodo Internet Security Pro 2012.
Best Antivirus Software
ITSM Support Model
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP