Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
The first video phone was a sensation at the 1939 World’s Fair, and again a quarter century later at the 1964 World’s Fair. It was the tech of the future! Somehow, it seemed to be always in the future and people began wondering whether the future would ever arrive for it. As sometimes happen, the future tech did eventually materialize but in a somewhat different format than originally conceived.
Today’s version of the video phone is the Internet webcam. Slowly, but surely, webcams have become ubiquitous. They come standard on most desktops, laptops and tablet computers. Remote control webcams have become popular tools for monitoring babies or keeping up with what your cat is doing at home while you are at work.
All new communication technology generates privacy and security concerns, and there are plenty with webcams. A few years ago there was a controversy at a Pennsylvania school district that supplied students with laptops. They neglected to tell students and parents that staff at the school could use the cameras to keep an eye on them away from school!
The feature was intended to assist in the retrieval of a lost or stolen laptop, but the privacy issue surfaced when a student was disciplined for something they did at home and the school student produced a photo from the webcam as evidence. The case ended up in Federal court.
More recently, and of concern for Internet security, criminals have been found to hack into webcam systems to spy on people at home. In some cases this has been a prelude to a home invasion.
This week, the US Federal Trade Commission (FTC) warned of overseas web sites that display live views from unsuspecting webcam owners. Watching people and places that don’t know they are being spied on seems to be a popular past time for some people.
To protect against webcam vulnerability, the FTC recommends that is use IP cameras that encrypt the data it sends and you use the strongest security protocols, WP2A. Oh! And be sure to change the camera’s default passwords. Hackers love it when users do not change well known default passwords.
The FTC also recommends that you look for the “https:” in the URL when you visit you webcam site. That is good advice when you visit any site where you might exchange personal information because it means you have a secured, encrypted connection
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP