Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
In recent years, a combination of Onion routing and the Tor network have allowed users stay hidden with great internet privacy. This is appealing to many people concerned about increasing widespread and sophisticated internet surveillance. Unfortunately, it also provides an environment for hackers and internet fraudsters to flourish. Such locations are sometimes referred to as the “Darknet”.
Onion routing provides anonymous network communication by sending encrypted messages through multiple network nodes, referred to as onion routers. Since each onion router removes a portion of the encrypted message to reveal additional routing instructions, the analogy to peeling an onion is appropriate.
Tor is free software network that uses onion routing to direct Internet traffic through a free volunteer network that conceals a user’s location or usage from any network surveillance or traffic analysis. Tor began as project by the US Naval Research Labs and is currently operated by a legitimate non-profit project in the US. The Tor project organization asserts that it provides a valuable service for people who seek anonymity for legitimate reasons, including political activists, the media and their sources, the military and law enforcement.
According to the Tor web site: “Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.”
While Internet privacy is a legitimate, even noble purpose, it’s no wonder Tor started attracting a criminal element as well.
Earlier this month, we posted an article about the banking virus ZeuS which uses Tor for communication. The latest malware discovery being widely discussed in Internet security circles also relies on Tor to communicate with its clients and is nicknamed Chewbacca.
Chewbacca is a banking Trojan that steals victims login credentials and uses Tor to disguise its command and control communications. Fortunately, Chewbacca does not appear to have spread widely yet. However, it is an example of double edge sword that Tor’s privacy protection offers.
Best IT Service Management Tools
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
agreecheck
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP