COMODO LAUNCHES MEMORY FIREWALL – ONE OF THE ONLY WAYS TO PROTECT AGAINST BUFFER OVERFLOW ATTACKS
Firewall : Free solution prevents over 90% of buffer overflow attacks
Jersey City, NJ (January 16, 2008) – In its continuing commitment to keep PCs safe from malware, Comodo, a leading security company, announced today an important, new security solution to prevent buffer overflow attacks from damaging users computers. Buffer overflow attacks are often used by ID stealing thieves to deliberately cause the buffer overflow to crash a computer which creates the opportunity for the hacker to then run malicious code and even gain control of the entire operating system. Comodo Memory Firewall is a prevention tool which is free and prevents most (90+%) buffer overflow attacks.
Buffer overflow attacks are difficult to detect because these attacks can be launched just by visiting a site. To attack a computer, a malicious program or script deliberately sends more data to its memory buffer than the buffer can handle leaving the system vulnerable to malware that can reformat the hard drive, steal sensitive user information, or even install programs that transform the machine into a Zombie PC. Since Comodo Memory Firewall detects most buffer overflow attack attempts such as attacks on STACK memory, HEAP memory, ret2libc attacks and of corrupted/bad SEH Chains, Comodo Memory Firewall protects against data theft, computer crashes and system damage by preventing most types of buffer overflow attacks.
Working in tandem with Comodo Memory Firewall is Comodo Firewall Pro, an acclaimed firewall highly rated by PC Magazine and CNET. Together, these two free solutions deliver a preventative model for unparalleled desktop security that prevents malware from ever gaining access to a system in the first place.
“At Comodo, we have changed the model of how users’ PC are protected” , Melih Abdulhayoglu, CEO and Chief Security Architect of Comodo said. “Today, we deliver prevention-based security by only granting access to applications that we know to be trusted. This model is unique and mitigates threats because we are not trying to Identify malware per se as it is constantly changing. Rather, we built technology to enable the system to know what can be trusted. This avoids potentially damaging applications from ever being in a position to harm computers. That’s how PC can remain free from malware, and we are ones to deliver this level of technological innovation for free.”
To download these solutions, please visit http://www.comodo.com/products/free-products.php
The Comodo companies provide the infrastructure that is essential in enabling e-merchants, other Internet-connected companies, software companies, and individual consumers to interact and conduct business via the Internet safely and securely. The Comodo companies offer PKI SSL , Code Signing , Content Verification and Email Certificate ; award winning PC Security software; Vulnerability Scanning services for PCI Compliance ; secure e-mail and fax services.
Continual innovation, a core competence in PKI, and a commitment to reversing the growth of Internet-crime distinguish the Comodo companies as vital players in the Internet’s ongoing development. Comodo secures and authenticates online transactions and communications for over 200,000 business customers and 3,000,000 users of our desktop security products
For additional information on Comodo – Creating Trust Online® visit Comodo.com
For more information, reporters and analysts may contact:
Office: +1 (888) 266-6361