Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

11/30/2009
05:03 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Comodo Firewall Now Part of Comodo Internet Security

Software package protects PCs from malware by blocking unwanted software from downloading itself and running

Jersey City, NJ, November 25, 2009 - Reviewers have called Comodo's firewall "robust," "flameproof," a "critical security app" and "kick-$*%." The software package protects PCs from viruses and other Internet malware by blocking unwanted software from downloading itself and running. "Comodo's firewall is known all over the world for placing low demands on the PC's central processor and on its owner's wallet," said Melih Abdulhayoglu, CEO of Comodo. The Comodo security suite is free.

Savvy computer users know that the latest version of the Comodo firewall with its Defense+ Host Intrusion Prevention System (HIPS) may be downloaded as part of a package with Comodo's Antivirus software, which debuted in 2008. Once the user has downloaded the free package from one of many popular download sites or from www.personalfirewall.comodo.com, the user has the choice of installing either the firewall alone, or the antivirus alone or both.

"At Comodo we believe that a well-designed firewall should be every PC's first line of defense. That's why Comodo Internet Security offers both our firewall and our antivirus." said Abdulhayoglu. "Traditionalists want only the Comodo firewall. They can download Comodo Internet Security, and then only install the firewall."

"Of course, we recommend installing the entire Comodo Internet Security package," he said. "But please do install a firewall along with your antivirus."

He noted that the suite, which supports PC operating systems including Windows 7, offered revolutionary Default-Deny Protection. "Other security packages let in every software unless that software is on the security vendor's blacklist. Comodo makes your PC like a doorman building: nobody gets in unless you say it's okay. Our default position is that we deny any new software the right to come in. But that can be a lot of decisions, so we keep huge whitelist of files that we know are safe. Only if we don't recognize the file, we ask you. This keeps you safer from viruses, Trojans, and every other kind of malware."

Comodo Firewall and Comodo Antivirus are available in 17 languages within the Comodo Internet Security download package. For more information visit www.personalfirewall.comodo.com.

About Comodo

Comodo is a leading brand in Internet security, covering an extensive range of security software and services, including digital certificates, PCI scanning, desktop security, online faxing, and computer technical support services.

Businesses and consumers worldwide recognize Comodo as standing for security and trust. Comodo products secure and authenticate online transactions for over 200,000 businesses and have more than 18,000,000 installations of Comodo desktop security software, including an award-winning firewall and antivirus software offered at no charge.

The Comodo family of companies is committed to continual innovation, core competencies in PKI, authentication, and malware detection and prevention. As a catalyst in eliminating online crime, the companies' mission is to establish a Trusted Internet.

With US headquarters overlooking Manhattan on New Jersey's waterfront, and global resources in United Kingdom, China, India, Ukraine, and Romania, Comodo products offer intelligent security, authentication, and assurance.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-20001
PUBLISHED: 2021-04-11
In the standard library in Rust before 1.2.0, BinaryHeap is not panic-safe. The binary heap is left in an inconsistent state when the comparison of generic elements inside sift_up or sift_down_range panics. This bug leads to a drop of zeroed memory as an arbitrary type, which can result in a memory ...
CVE-2020-36317
PUBLISHED: 2021-04-11
In the standard library in Rust before 1.49.0, String::retain() function has a panic safety problem. It allows creation of a non-UTF-8 Rust string when the provided closure panics. This bug could result in a memory safety violation when other string APIs assume that UTF-8 encoding is used on the sam...
CVE-2020-36318
PUBLISHED: 2021-04-11
In the standard library in Rust before 1.49.0, VecDeque::make_contiguous has a bug that pops the same element more than once under certain condition. This bug could result in a use-after-free or double free.
CVE-2021-28875
PUBLISHED: 2021-04-11
In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
CVE-2021-28876
PUBLISHED: 2021-04-11
In the standard library in Rust before 1.52.0, the Zip implementation has a panic safety issue. It calls __iterator_get_unchecked() more than once for the same index when the underlying iterator panics (in certain conditions). This bug could lead to a memory safety violation due to an unmet safety r...