Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
Update: check the latest version of Comodo’s free mobile security app
The Black Hat 2013 conference held at Las Vegas a week ago was an eye-opener for security experts and common users. A slew of hackers, legitimate security agencies and specialists in the industry uncovered various bugs that threaten privacy, security and most of all, pose a threat to the very individual’s existence. Even cars and toilets could be hacked, is what the event revealed and sent a warning notice to everyone to take care of their digital belongings.
Mobile Security is a high concern at this year’s Black Hat conference because smartphones and tablets are the most preferred consumer medium in modern times. While the iOS and Android war rages, consumers are put at risk because of rogue apps, malware third party app markets, modified file packages and other threats in various forms.
With over 7, 500 attendees, it was a grand event and witnessed some insightful look into Mobile Security.
One of the events demonstrated how a malicious charging device, a simple USB stick can be used to bypass all types of security measures in place integrated by the iOS operating system. It even managed to skip digital signature verifications system and installed phony apps with injected malware in it. The surprising revelation was, the task was done without even jailbreaking the iPhone.
Android Apps Insecure?
A majority of the security experts claimed mobile security is at risk when using third party app stores to download Android apps. The official app store verifies an app with its digital signature and untampered seal. Hackers managed to download an app, unwrap the coding system and inject malware before uploading it again onto other app stores. Users who assume that a digital signature verification is all they need will that find it doesn’t exist and chances are high that they might be downloading a bug or virus instead of an app.
Similarly, the concept of creating multiple spam accounts on social networking websites by using cryptographic keys used for signing Android applications was also demonstrated. This allows bots to be part of the social networking community and spread malware, spyware at a rapid rate on desktop PCs, tablets and smartphones easily.
The process of altering an authorized Android application to bring it under the hacker’s control was staged. Using the method, a third party from any part of the globe can control your smartphone, read its messages, record phone calls and much more. Similar bugs and issues in Blackberry 10 OS was also revealed at the press conference.
Best Security Managers
All the hue and cry of mobile security threats at Black Hat 2013 conference revealed that using best security managers is the first and mandatory step for every user. Comodo is a leading security solutions company and a certificate authority. The trust assurance company always stay ahead with latest technology deployed to fight such threats at an early stage. The Android mobile security app from Comodo is available for download on Google Play Store. The purpose of the conference is to educate users and product or software developers to be aware of the loopholes which is achieved, yet again!
Antivirus for iPhone
Tags: Mobile Security
Reading Time: 3 minutes “The October 2017 discovery of KRACK is significant for the security of virtually all smart phone users; the threat is real and pervasive” said Fatih Orhan, head of the Comodo Threat Intelligence Lab and Comodo Threat Research Labs (CTRL). This blog explores the questions (and provides some answers) about the key new vulnerabilities and potential…
Reading Time: 3 minutes Update: check the latest version of Comodo’s free mobile security app When Apple announced the Touch ID technology that rolled out with the new iPhone 5, it sounded like science fiction. Your phone can now be secured by your own fingerprint. Can the retinal (eyeball) scanning made famous in films like Mission Impossible be far…
Reading Time: 3 minutes Update: check the latest version of Comodo’s free mobile security app There are tons of security tips provided online for the average. So much that it can actually be confusing. This is especially true when using mobile technology, which is increasing essential, but increasingly a target for hacker The following Mobile Antivirus prevention tips are…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP