Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

3/23/2010
10:44 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Comodo Rolls Out Cloud Scanner Portable Utility

Tool identifies malware, viruses, suspicious processes and other problems that are commonly present on PCs

Jersey City, NJ, March 17, 2010 - Comodo, a leader in cybersecurity, announced the availability of Comodo Cloud Scanner, an easy-to-use tool that quickly and accurately identifies malware, viruses, suspicious processes and other problems that are commonly present on PCs

Rather than grinding a PC to a halt as viruses used to do, today's malware may install itself and hover quietly in the background. It may activate the PC at scheduled times, using it as a relay station for spam. Or it may record confidential passwords and pass them back to the software's creator. With the passwords, the creator can raid the PC owner's online bank account. Until the bank statement arrives, the only symptom of infection may be that the computer runs slightly slower.

Comodo Cloud Scanner isn't just about finding malware and viruses. It also helps identify other types of files that might be causing problems, specifically:

* Malware / Suspicious File Scanner Comodo Cloud Scanner offers an extremely fast way of finding out whether computers have viruses, root-kits, worms, suspicious drivers/services and non-trusted processes. Apart from using a locally installed white-list of trusted executables, CCS also uses a real-time file look-up service to identify malware and suspicious (untrusted) files. The scanner discovers any hidden processes that are running on computers - processes which may have been started by malicious software. * Registry Scanner Whenever users perform tasks such as installing or removing a program or modifying a file on their computers, Windows creates an entry in the Windows Registry to reflect this change. Over time, these entries become disorganized and cluttered and slow PCs down. This is because, as the size of the registry grows, it takes longer and longer for Windows to sift through it to locate and update the entries for any new tasks. In short, systems become sluggish and slow. Cloud Scanner identifies Windows Registry problems by running an in-depth scan to find any unnecessary or corrupt or malicious keys. After cleaning the registry, Windows will be able to access the information it needs from the registry much more quickly - computers get an immediate performance and stability boost. * Junk File Scanner Over time disk drives become cluttered with temporary Internet files, logs, needless archives, unused icons and duplicate files. These junk files take up valuable hard disk space and can have a negative impact on the PC performance. Examples include temporary files created by Windows, files retained in the Recycle bin, Windows log files, temporary Internet files, and temporary files created by Office Suite. Comodo Cloud Scanner scours systems and identifies unnecessary files. * Privacy Scanner Windows and other popular software keep records of recent computer activities in the form of temp files, histories, cache files, cookies and usage records. This data represents a potential security threat because it might be accessed by hackers or other people using the computer. For example, anybody with access to this information can know exactly what work was performed on the computer, and which Internet sites the user has visited. Such a person can even read a full transcript of instant messenger conversations. Comodo Cloud Scanner helps protect PC users from identity theft by comprehensively identifying all traces of personal data that may lurk in Internet browsers, IM clients and many other applications

Comodo Cloud scanner runs straight from Comodo's cloud servers, eliminating the need for users to install multiple programs. This approach also yields extremely accurate scans incorporating the latest virus signature database . Another benefit of the Cloud architecture is that scans are fast and consume minimal PC resources.

About Comodo

Comodo is a leading brand in Internet security, covering an extensive range of security software and services, including digital certificates, PCI scanning, desktop security, online faxing, and computer technical support services.

Businesses and consumers worldwide recognize Comodo as standing for security and trust. Comodo products secure and authenticate online transactions for over 200,000 businesses and have more than 25,000,000 installations of Comodo desktop security software, including an award-winning firewall and antivirus software offered at no charge.

The Comodo family of companies is committed to continual innovation, core competencies in PKI, authentication, and malware detection and prevention. As a catalyst in eliminating online crime, the companies' mission is to establish a Trusted Internet.

With US headquarters overlooking Manhattan on New Jersey's waterfront, and global resources in United Kingdom, China, India, Ukraine, and Romania, Comodo products offer intelligent security, authentication, and assurance.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Commentary
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
News
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
News
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21360
PUBLISHED: 2021-03-09
Products.GenericSetup is a mini-framework for expressing the configured state of a Zope Site as a set of filesystem artifacts. In Products.GenericSetup before version 2.1.1 there is an information disclosure vulnerability - anonymous visitors may view log and snapshot files generated by the Generic ...
CVE-2021-21361
PUBLISHED: 2021-03-09
The `com.bmuschko:gradle-vagrant-plugin` Gradle plugin contains an information disclosure vulnerability due to the logging of the system environment variables. When this Gradle plugin is executed in public CI/CD, this can lead to sensitive credentials being exposed to malicious actors. This is fixed...
CVE-2021-24033
PUBLISHED: 2021-03-09
react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoke...
CVE-2021-21510
PUBLISHED: 2021-03-08
Dell iDRAC8 versions prior to 2.75.100.75 contain a host header injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by injecting arbitrary ‘Host’ header values to poison a web-cache or trigger redirections.
CVE-2020-27575
PUBLISHED: 2021-03-08
Maxum Rumpus 8.2.13 and 8.2.14 is affected by a command injection vulnerability. The web administration contains functionality in which administrators are able to manage users. The edit users form contains a parameter vulnerable to command injection due to insufficient validation.