Comodo: Cloud Native Cyber Security Platform

The latest news from Comodo

NEWS
  • Trusted by:
  • seal of utah
  • shell logo
  • samsung logo
news play icon

Internet Security for Undetected Malware Threats, A Growing Risk for Internet Users

Jersey City, NJ, March 25, 2010 – Comodo, a leader in cybersecurity, announced that the amount of malicious software (malware) not detected by PC Security software is increasing, and that this represents a significant risk for Internet users. In March, 2010, VirusTotal.com, a service that analyzes suspicious files, identified more than 70,000 infected files that went undetected by one or more anti-virus engines—a more than 30% increase from last year. The sheer number of new, undetected files highlights the major threat facing Internet users today: non-detection by traditional PC Security software.

These undetected threats create a window of vulnerability for Internet users, who may encounter them prior to the availability of a detection signature by their security software vendor. This window can remain open for hours, days, weeks, or even longer. The longer this window stays open, the greater the damage done.

Even software applications that Internet users have long assumed were safe can now be infected, according to security journalist Mike Vizard. Web sites themselves—including social networking sites—can now be impregnated with malware, as can applications such as video or audio players, as well as cloud computing. URL shortening services can also redirect users to malicious sites. Vizard described these ruses and others in the State of Vermont’s Outlook to Security in 2010 Newsletter.

Melih Abdulhayoglu, CEO and founder of the Comodo companies, explains the problem of undetected malware and what to do about it in his Internet Security Insider Video Blog program “Desktop Security – You Need Three Layers.” In the video, Abdulhayoglu outlines the flaws in traditional PC Security approaches and provides a solution to the problem based on the principle of preventing, rather than detecting, malware as the first line of defense employed by PC Security software. The video can be viewed at Comodo.TV, Comodo’s Internet Video Channel.

About Comodo

The Comodo companies provide the infrastructure that is essential in enabling e-merchants, other Internet-connected companies, software companies, and individual consumers to interact and conduct business via the Internet safely and securely. The Comodo companies offer PKI SSL, Code Signing, Content Verification and Email Certificate; award winning PC Security software;  Vulnerability Scanning services for PCI Compliance; secure e-mail and fax services.

Continual innovation, a core competence in PKI, and a commitment to reversing the growth of Internet-crime distinguish the Comodo companies as vital players in the Internet’s ongoing development. Comodo secures and authenticates online transactions and communications for over 200,000 business customers and 3,000,000 users of our desktop security products.

For additional information on Comodo – Creating Trust Online® visit Comodo.com

For more information, reporters and analysts may contact:

Comodo
Email: media-relations@comodo.com
Office: +1 (888) 266-6361

Scroll to Top