Comodo launches Memory Firewall - one of the only ways to protect against buffer overflow attacks

Dark Reading Staff, Dark Reading

January 17, 2008

2 Min Read

JERSEY CITY, N.J. -- In its continuing commitment to keep PCs safe from malware, Comodo, a leading security company, announced today an important, new security solution to prevent buffer overflow attacks from damaging users computers. Buffer overflow attacks are often used by ID stealing thieves to deliberately cause the buffer overflow to crash a computer which creates the opportunity for the hacker to then run malicious code and even gain control of the entire operating system. Comodo Memory Firewall is a prevention tool which is free and prevents most (90+%) buffer overflow attacks.

Buffer overflow attacks are difficult to detect because these attacks can be launched just by visiting a site. To attack a computer, a malicious program or script deliberately sends more data to its memory buffer than the buffer can handle leaving the system vulnerable to malware that can reformat the hard drive, steal sensitive user information, or even install programs that transform the machine into a Zombie PC. Since Comodo Memory Firewall detects most buffer overflow attack attempts such as attacks on STACK memory, HEAP memory, ret2libc attacks and of corrupted/bad SEH Chains, Comodo Memory Firewall protects against data theft, computer crashes and system damage by preventing most types of buffer overflow attacks.

Working in tandem with Comodo Memory Firewall is Comodo Firewall Pro, an acclaimed firewall highly rated by PC Magazine and CNET. Together, these two free solutions deliver a preventative model for unparalleled desktop security that prevents malware from ever gaining access to a system in the first place.

"At Comodo, we have changed the model of how users' PC are protected", Melih Abdulhayoglu, CEO and Chief Security Architect of Comodo said. "Today, we deliver prevention-based security by only granting access to applications that we know to be trusted. This model is unique and mitigates threats because we are not trying to Identify malware per se as it is constantly changing. Rather, we built technology to enable the system to know what can be trusted. This avoids potentially damaging applications from ever being in a position to harm computers. That's how PC can remain free from malware, and we are ones to deliver this level of technological innovation for free."

Comodo Group

About the Author(s)

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights