Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
Besides using Comodo Internet Security, the best way to protect your computer is to keep up with all of the security updates for you operating system. The Windows OS is the hacker’s favorite target, but if you think you don’t have to worry about this because you use the Mac then I regret to inform you that you are wrong.
Hackers are increasingly looking beyond Windows for targets and the Mac platform is the second most popular OS for desktops and laptops, with 7.26% of the market according to netmarketshare.com. That may not sound like a lot, but we are talking about a huge market. The Mac is also popular in certain fields such as graphic design and engineering. If you are planning a denial of service attack on such a firm, you need to include it in your attack vector. Not that I’m suggesting it!
In September, Apple rolled out a new set of patches and security updates for OS X Mountain Lion and Safari. The company released 10.8.5, a security update for Mountain Lion that they claim will boost security, stability and compatibility. According to the official support page, the update fixes 30 different bugs in the operating system which is detailed in the official support page of Apple website. It addresses multiple issues that Safari has with the Apache web server, including preventing cross-site scripting errors. It also defends the Mac against denial of service attack caused by vulnerabilities in BIND, the DNS software.
Other problems addressed by this update include issues with PHP, PostgreSQL and OpenSSL. The security vulnerabilities found in these areas could lead to data corruption, arbitrary code execution and privilege escalating problems.
Also included is an update for the Certificate Trust policy that removes several root certificates that were no longer legitimate. Its installer function will no longer allow the installation of software with revoked certificates. Previously, the installer displayed a warning and allowed the user the option to proceed.
Apple is expected to wind up their cat names series of operating systems, Lion, Mountain Lion, etc. The company is set to release their new series of operating systems beginning with Mavericks. It will be officially launched in October 2013 and it will be very interesting to see how it fares in the market.
Reading Time: 3 minutes Celebrate National Cybersecurity Awareness Month By Learning to Protect Against Ransomware Attacks It’s the season for pumpkin picking, leaves changing color, getting ready for Halloween parties and trick-or-treating. But ghosts and ghouls aren’t the only scary things you’ll be seeing this month: October is also National Cybersecurity Awareness Month, a time when business leaders and…
Reading Time: 3 minutes Usually summer means vacation and relaxation. But as we’ve seen in recent history, summer plans can be brutally disrupted when cyber threats strike. Just two years ago, the headquarters of A.P. Møller-Maersk, shipping conglomerate in Copenhagen, was virtually destroyed due to infectious malware called NotPetya. On the eve of a national holiday, employees were preparing…
Reading Time: 4 minutes It’s a mad, mad, mad, malware world. The good news is that the number of malware attacks is decreasing. The bad news is that malware forms are proliferating, attackers are getting smarter, and companies are still vulnerable. Just how bad is the problem? The answer is: very. While known threats are largely preventable, more…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
See how your organization scores against cybersecurity threats