Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
Besides using Comodo Internet Security, the best way to protect your computer is to keep up with all of the security updates for you operating system. The Windows OS is the hacker’s favorite target, but if you think you don’t have to worry about this because you use the Mac then I regret to inform you that you are wrong.
Hackers are increasingly looking beyond Windows for targets and the Mac platform is the second most popular OS for desktops and laptops, with 7.26% of the market according to netmarketshare.com. That may not sound like a lot, but we are talking about a huge market. The Mac is also popular in certain fields such as graphic design and engineering. If you are planning a denial of service attack on such a firm, you need to include it in your attack vector. Not that I’m suggesting it!
In September, Apple rolled out a new set of patches and security updates for OS X Mountain Lion and Safari. The company released 10.8.5, a security update for Mountain Lion that they claim will boost security, stability and compatibility. According to the official support page, the update fixes 30 different bugs in the operating system which is detailed in the official support page of Apple website. It addresses multiple issues that Safari has with the Apache web server, including preventing cross-site scripting errors. It also defends the Mac against denial of service attack caused by vulnerabilities in BIND, the DNS software.
Other problems addressed by this update include issues with PHP, PostgreSQL and OpenSSL. The security vulnerabilities found in these areas could lead to data corruption, arbitrary code execution and privilege escalating problems.
Also included is an update for the Certificate Trust policy that removes several root certificates that were no longer legitimate. Its installer function will no longer allow the installation of software with revoked certificates. Previously, the installer displayed a warning and allowed the user the option to proceed.
Apple is expected to wind up their cat names series of operating systems, Lion, Mountain Lion, etc. The company is set to release their new series of operating systems beginning with Mavericks. It will be officially launched in October 2013 and it will be very interesting to see how it fares in the market.
Reading Time: 4 minutes Increased dependency on computers and access to data makes an organization more vulnerable to cybersecurity threats. With the increase in cyber-criminals and cyber-attacks, many companies today are looking for greater protection of their decentralized computing work environments from their Managed Service Providers (MSPs). As a result, MSPs need to deliver firewall solutions that are designed…
Reading Time: 3 minutes Rapid technological growth and increasing digitalization in all aspects of life around the world have increased the value of ensuring cyber-security at all levels. This is increasingly true for EU member states and the organizations that are based in or operate from these countries. The number of cyber-attacks targeting EU member states has risen. The…
Reading Time: 3 minutes Disruptions are often unforeseen. This could be a catastrophic event like a hurricane, a fire, or an earthquake. Disruptions, however, can also come in other forms such as that of a pandemic. This means that a building doesn’t necessarily have to be demolished or lives have to be lost for an unforeseen event to completely…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
See how your organization scores against cybersecurity threats