Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: March 27th, 2015
Linux Security Week: March 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

CryptoLocker Ransomware Continues to Claim Victims While Enterprises Remain Safe with Comodo Endpoin Print E-mail
User Rating:      How can I rate this item?
Source: LinuxSecurity Contributors - Posted by Administrator   
Latest News Comodo, a leading Certificate Authority and Internet security organization, today announced that their Comodo Endpoint Security Manger software proactively protects against endpoints from getting hit by the CryptoLocker ransomware. CryptoLocker is a Trojan that is spread mainly through fake emails that mimic the look of legitimate businesses or via phony FedEx and UPS tracking notices. Once the user opens the malicious message, CryptoLocker installs itself on the user's system, scans the hard drive, and encrypts the files. All files are rendered inaccessible to the user until he or she pays a ransom to receive a decryption key.

ESM and its Comodo Endpoint Security (CES) software is able to assist in preventing threats including the CryptoLocker ransomware by isolating all unknown applications (malicious or not). If the threat is known to be malicious, the Antivirus (AV) will detect the signature and prevent the encryption of your files. If the threat is unknown, the HIPS and Auto-Sandbox will intercept it and stop it from contaminating the underlying operating system. Therefore, even before CryptoLocker became a known virus, CES would automatically sandbox it to prevent encryption of your files.

"CESM 3 is truly next generation in proactive endpoint security" said Michél Bechard, Comodo Product Line Manager, "because it's the only anti-malware solution that brings 5 layers of defense (Antivirus, Firewall, Host Intrusion Prevention, Auto-Sandbox & File Rating) to the point of impact, the desktop. We have such confidence in the strength of our solution that we are the only AV vendor to offer our customers up to a $5,000 limited warranty against infection."

Comodo's new Endpoint Security Manager 3 (CESM 3) platform provides a state-of-the-art anti-malware suite used to coordinate threat protection on local and remote endpoints from one browser based console and is designed to assist system and security administrators with centrally managing their laptop, desktop, and server endpoints with a minimum of administrative effort. The latest version of CESM see the addition of sever new capabilities, including centralized monitoring of sandboxed (unknown) and malicious files, Endpoint auto-synchronization via Active Directory, Encrypted VNC sessions to local & remote endpoints and support for Windows 7 Embedded Standard.

To learn more about the next generation in proactive endpoint security, visit:

To Download a 60-Day, 60 user free trial, visit:

About Comodo

Comodo is a leading internet security provider. With U.S. Headquarters in New Jersey and global resources in UK, China, India, Ukraine, and Romania, Comodo provides businesses and consumers worldwide with security services, including SSL Certificate, PCI scanning, desktop security, and remote PC support. Securing online transactions for more than 200,000 businesses, and with more than 35 million desktop security software installations, including an award-winning firewall and antivirus software, Comodo is Creating Trust Online®. To learn more, visit Comodo's website:

For more information, reporters and analysts may contact:

Office: +1 (201) 963 0004 x 4000

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Tech Companies, Privacy Advocates Call for NSA Reform
Google warns of unauthorized TLS certificates trusted by almost all OSes
How Kevin Mitnick hacked the audience at CeBIT 2015
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.