Jersey City, NJ (April 18, 2008) - Comodo , a leading security company, announced today the release of a new application which incorporates five new security and HIPS functionality tests. These tests, especially those that detect rootkit installations, incorporate techniques commonly used by virus authors and provide a very good indication of a security product's ability to block real-world threats. Comodo developed these tests largely so that it can deliver new preventative intelligence to end users on the performance of their PC Security solutions before damage is done.
Comodo Malware Labs is constantly identifying techniques that malware authors use to bypass PC Security solutions. One particularly damaging threat identified by Comodo engineers occurs when a rootkit is installed, without permission, on a user's system. Rootkits are the "ultimate backdoor" giving hackers ongoing and virtually undetectable access to the systems they exploit. Rootkits are so damaging because they compromise computer systems by subverting the Windows Kernel, the central component of most computer operating systems (OSs) which manages the system's resources and the communication between hardware and software components. In worse case situations, a PC can be rendered useless once it has been infected with a rootkit, as often this type of virus cannot easily be removed or quarantined. Therefore, it is critical that users have an easy means to test for this type of vulnerability before damage is done. It is Comodo's hope that end users who discover they are vulnerable to rootkit installations after running these new tests will take measures to upgrade or replace their security software.
This set of testing tools was designed to emulate different types of attacks and include the following tests:
" Comodo's Labs identify many different techniques used by malware authors around the globe ." said Melih Abdulhayoglu, CEO and Chief Security Architect of Comodo. " It is our hope that with these set of tests, users can be better informed about the state of their PC Security and deliver this vital feedback back to their security providers. This is how we hope these tests will help drive better security solutions - industry wide ."
The Comodo companies provide the infrastructure that is essential in enabling e-merchants, other Internet-connected companies, software companies, and individual consumers to interact and conduct business via the Internet safely and securely. The Comodo companies offer PKI SSL , Code Signing , Content Verification and Email Certificate ; award winning PC Security software; Vulnerability Scanning services for PCI Compliance ; secure e-mail and fax services.
Continual innovation, a core competence in PKI, and a commitment to reversing the growth of Internet-crime distinguish the Comodo companies as vital players in the Internet's ongoing development. Comodo secures and authenticates online transactions and communications for over 200,000 business customers and 3,000,000 users of our desktop security products.
For additional information on Comodo - Creating Trust Online® visit Comodo.com
For more information, reporters and analysts may contact:
Office: +1 (888) 266-6361