Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
Last Saturday, I was surprised to see a news story that Homeland Security is recommending that all desktop users disable Java. We just went through this last August with Oracle and Java! I even checked the article dates to make sure they weren’t posted in error.
Sure enough, zero-day exploit vulnerabilities have been identified in compromised Java web sites. Oracle has rushed out a patch to deal with these problems, one of which is a bug that some analysts feel should have been fixed when the August exploits were revealed.
As the great Yogi Berra would say, “It’s Déjà vu all over again!”
These vulnerabilities are as serious as they can get. They can be used to trick your browser and operating system into downloading malicious software from a compromised web site and escalating the malware’s system rights. If it can do that, the hackers can do anything they want to harm or control your compute.
There are reports that criminal toolkits, available on the internet, have been updated to exploit these Java zero-day vulnerabilities. Sadly, there is a big market for these toolkits.
Perhaps you enjoy having a zombie computer that sends out junk email, commits click fraud or is part of denial of service attacks. Maybe you aren’t worried about someone stealing your personal information for financial fraud. And your hard drive might not be important enough to you that you care if somebody messes.
As for me, I opt out!
In response to the August Java zero-day exploits, I published an article titled, “Java Zero-day Exploits: Why I am Not Worried”. My reason then for being unconcerned is the same reason today I am STILL not worried.
My computers are protected by our Comodo Internet Security 2013 antivirus. Other Antivirus systems compare programs to a file of known viruses and malware, which requires constant updates to the file. There are thousands of new viruses introduced every day!
Comodo uses a “default deny” system that will run any program that it is not sure of in an isolated system area called a sandbox. The chances of any malware ever impacting your system are dramatically reduced, even when they haven’t been identified yet by the Internet security community.
How dramatic? Enough that Comodo provides a $500 guarantee that your computer will not be harmed from malware when protected with its antivirus.
So, no worries.
Not only that, Comodo Internet Security 2013 has new protections. If I want to make absolutely sure a Java application is safe, I can run it in our new Virtual Kiosk. The Kiosk is a virtual windows desktop complete with icons for running your favorite programs, as shown below:
/>
Like our Auto Sandbox Technology, a malicious application running in the Virtual Kiosk can’t harm the rest of the computer. You can even use a virtual keyboard that protects you from spyware that record your keystrokes, as shown in the example .
You can also choose to run a program in the sandbox. For example, if you need to use a Java enabled web site and are concerned by the recent warnings, simply run the browser in the sandbox. The browser window will have a green shade around it to let you know that you are protected.
Comodo is great for the user who wants to “set it and forget it”, but for those want to go under the covers and manage at a lower level they provide tools like the Killswitch window, shown in the example below:
In this example, the programs shaded in gray are running “virtualized” in the sandboxed. The Killswitch includes a rating to help you know if a program can be trusted, and options to halt and delete a program if it can’t.
Comodo has a proactive approach to fighting malware. The sandbox and Virtual Kiosk protect you against any untrusted program, not just known threats like the new Java exploits. We provide solutions that will protect against malware not yet invented and exploits not yet found.
Related Resources:
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
agreecheck
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP