Connect with us

Cyber Security

Comodo 2013: A Year of Achievements and Milestones

Avatar

Published

on

Reading Time: 3 minutes

Few years in the history of Comodo have been eventful as 2013. We completed our move to new offices in Clifton NJ, released major updates to key products and introduced ground breaking new applications. All in all, it was a year well worth remembering.

January
In one of the most significant event in recent years, we released Computer Internet Security 6, which integrates cutting-edge technology such as Comodo’s Auto Sandbox Technology™ and Virtual Kiosk. The CIS 6 sandbox is a virtual operating environment for untrusted programs – ensuring viruses and other malicious software are completely isolated from the rest of your computer. The new Virtual Kiosk gives you and extra level of security by allowing you to run a virtual desktop right inside of the sandbox.

Additionally CIS 6 includes an advanced system activity utility called Killswitch and improved Firewall and Rescue Disk tools. With an intuitive user interface, Windows 8 compatibility and enhanced performance CIS 6 sets the standard for anti-virus protection solutions.

February
In a move to challenge the status quo in endpoint management, we release the groundbreaking Comodo Endpoint Security 3.0, which incorporates ‘Defense in Depth’ to the desktop environment. It features blacklist based detection, the industry recognized Comodo Firewall, the behavioral analysis engine of the Defense+ Host Intrusion Prevention System (HIPS) which filters unknown or malicious programs allowing only known-good programs to run along with the unique Auto-Sandbox which defends systems from potentially malicious files. Comodo offers you the most comprehensive solution to locking down and managing your endpoints.

Also in February, CIS 6 achieve the top ranking the ongoing Matousec.com “Proactive Security Challenge”, a spot it has maintained all year.

April
CIS 6 received a perfect score for protection from AV-Test Labs, testing on Windows XP. Comodo was the only free antivirus to receive a perfect score.

June
We added the free PrivDog privacy protection extensions to the installation options for the Comodo Dragon browser. PrivDog from AdTrustMedia improves the transparency, privacy and speed of your online experience by automatically detecting and blocking processes that are attempting to track your online activity. Whenever you visit a website, PrivDog will display the number of privacy threats it has blocked in the top-right corner of your browser.

On June 17, AV-TEST Labs released test results of 30 Android Mobile Security products conducted in May 2013 using Android 4.2.2. Comodo Mobile Security 2.0 scored 5.5 of 6 for Protection and a perfect 6 for Usability in AV-TEST’s two testing categories

August
CIS 6.2 received a perfect score for protection from AV-Test Labs, testing Windows 7. Scores for performance and usability were also high. Comodo was the only free antivirus to receive a perfect score.

September
On September 30th, Online Certificate Status Protocol (OCSP) responders handled over 2 billion requests in one day. The statistic proves Comodo’s continued investment in their revocation checking infrastructure has allowed us to meet the exponential growth of SSL secured Internet traffic. OCSP is a protocol enabled in modern browsers which makes real time checks as to whether or not an SSL certificate has been revoked.

CIS 6 once again in September received a perfect score for protection from AV-Test Labs, testing Windows XP. Importantly, the testing also gave CIS 6 high scores for performance and usability.

October
In October we added the free PrivDog privacy protection browser extensions to the installation options for the Comodo Internet Security.

November
Comodo Penetration Testing Services was rebranded as Dragon Labs, a Comodo company. Penetration testing services simulate a highly skilled and motivated hacker in their attempts to access your organization’s financial, customer and other sensitive data.

December
As of December 1st, the Comodo Anti-spam Gateway had filtered its 50 millionth spam email. To-date, ASG has filtered 50,911,110 emails of which 37,954,073 were found to be spam and over 140,000 viruses were blocked by ASG. Live statistics are available of the Anti-spam website found here Comodo.com/business-security/email-security/antispam-gateway.php.

In December we announced several significant enhancements to our backup and storage solutions. CCloud has a brand new, redesigned website: Ccloud.com. Additionally, CCloud now offers 10 GB of free storage space plus another 10 GB for referrals, upgrading from the previous offer of 5 GB of free storage space. Enhancements to CCloud include an even more secure file storage solution with a significant increase in upload/download and browsing speed compared to the last version.

Comodo Backup features 10 GB of free online storage space. Comodo Backup is offered as a free complement to Comodo Cloud so customers can make sure their data is backed up. Users get 10 GB of highly secure, online storage which can be accessed from any computer. Comodo Backup will find and categorize all files including: music, videos, photos, and mail so users can immediately start backing up important data.

TEST YOUR EMAIL SECURITY GET YOUR INSTANT SECURITY SCORECARD FOR FREE Source: https://blog.comodo.com/comodo-news/comodo-2013-a-year-of-achievements-and-milestones/

Cyber Security

Denmark’s News Agency Rejected a Ransom Demand by Hackers to Release Locked Data

Avatar

Published

on

Hackers

Following a hacking attack this week, Denmark’s biggest news agency will remain offline for at least another day and has refused a ransom demand by hackers to open locked records, the wire service said Wednesday.

Ritzau CEO Lars Vesterloekke could not tell how high the demand for ransom was because those behind the “professional assault” left “a file with a message” that was not opened by the department following his advisers’ orders.

Ritzau, which sends text and images to the Danish media, said it had moved its consumer emergency delivery to six “better overview” live blogs.

“If it goes as expected, then on Thursday we can gradually return to normal,” Vesterloekke said, adding that the attack forced the editorial systems to shut down as approximately a quarter of Ritzau’s 100 servers were destroyed.

Ritzau employed an external defence firm that specialises in washing up after hacker attacks, in addition to the agency’s own IT department, and the insurance company helped with specialists.

It was unclear who was behind the assault that began Tuesday.

Ritzau, based in Copenhagen, has distributed information and produced news for the Danish newspapers, organisations and businesses since 1866.

Source: https://cybersguards.com/denmarks-news-rejected-ransom-demand-hackers-release-locked-data/

Continue Reading

Cyber Security

What is Google Scraping Used For – 5 Use Cases

Avatar

Published

on

Google update

Google and web scraping are two rather new technologies that are increasingly being used by large businesses. Put simply, a web scraping tool is a technology solution to extract data from web sites in a quick, efficient, and automated manner, offering data in a more structured and easy to use form. When Google is being scraped, the same process applies, except the data is being extracted from the search engine.

Businesses often use Google scrapers to automate data acquisition processes. Scraped data is used to enhance operations, inform executive decisions all the way down to individual customer service experiences.  Google provides its own Application Programming Interface (API), it chooses which information is more important to users based on its own analysis.  Yet, many businesses choose to build their Google scraper or use third-party services  in order to gather data in a more efficient manner.

Google isn’t too keen on letting other tools acquire data from their search engine. Often they will employ anti-bot measures to prevent automated applications from acquiring data. Quite ironically, they have themselves used exactly the same process to build their search engine. Whether people like it or not, web and Google scraping is here to stay as businesses have already started using it for several reasons.

Table of Contents

Piracy and Counterfeit Protection

Many large companies and well-known brands utilize Google scraping to monitor search engine results for any malicious entities attempting to illegally use their branding. For example, Adidas might use a search engine scraping tool to monitor for any illegitimate websites that attempt to profit off of their brand illegally.

Price Monitoring

Google scraping can be used to analyze the competitor pricing policy, evaluate prices and product policies of competitors which is a great deal of information for sales strategies. Data acquired in this manner can be used to create updated and advanced pricing strategies for brand and sales (for example, dynamic pricing utilizes scraping tools to implement their strategy). Implementing advanced pricing strategies requires having access to a reliable and consistent flow of premium data. Price monitoring using web scraped data gives companies the ability to have well-grounded information of the entire market, facilitating dynamic pricing, revenue optimization, and ensuring they’re always one step ahead of their competitor’s pricing strategies. Having detailed information related to competitor sales strategies helps businesses keep up with the competition and customer demand.

SEO Monitoring

Generating organic traffic on a website is mostly about ranking, location, and keyword combinations. Google scraping can show a company or a business the level at which its website page appears on the Google results page. It can also show the keywords the website uses on a given page and what exactly they rank for. SEO experts have to often use third party SEO tools like Ahrefs, Moz, or others to gain insight into rankings. Unfortunately, these tools update their databases once every few days which is often not enough for extremely volatile search engine result pages. Therefore, SEO experts might use Google scraping tools to acquire data that is otherwise unavailable to gain insight into ranking changes.

Keyword Monitoring and Research

SEO experts rely on several sources of data to create their optimization strategies. The first source is often Google blogs, the search engine liaison, and a few other official sources. Other sources are third party providers that scrape the search engine in order to reverse engineer the algorithms. SEO experts use third party providers and Google scrapers to monitor search engine result pages. By monitoring SERPs, insights can be gleaned from the data such as why certain pages rank higher than others. Finding out why certain pages rank better than others can help SEO experts develop strategies that can help companies beat out the competition.

SEM Surveillance

Nearly everyone nowadays is buying PPC (Pay-Per-Click) ads on search engines nowadays. Businesses even bet on the competitor keywords and brand names in order to attract visitors to their website. Keeping track of what the competition is doing is nearly impossible without utilizing Google scraping as all ads will not be shown to all users.

For SEM surveillance, businesses scrape Google or use a third party provider in order to acquire ads from any location and device without using their own business IP address. This way Google will display ads as if it was any regular user doing a search query.  As Google thinks the query has been sent by a regular internet user, it will often display many more ads without any restrictions. Business can then easily acquire significant amounts of data on their competitor ad campaigns.

Conclusion

Google scraping has proved purposeful, its advantages are so many, businesses have become successful with the use of Google scraping by gathering data and putting it to good use. A Google data extraction tool is an easy way for businesses to gain a competitive edge in nearly any market. With very little development effort, access to nearly infinite amounts of data appears within hands reach.

Source: https://cybersguards.com/what-is-google-scraping-used-for-5-use-cases/

Continue Reading

Cyber Security

Stantinko Observed Using a New Version of a Linux Proxy Trojan

Avatar

Published

on

Linux

Using a new version of a Linux proxy Trojan, a threat community monitored as Stantinko was observed posing as Apache servers to stay undetected.

Stantinko is thought to have been running since at least 2012, initially outlined in 2017, ensnaring compromised networks into a botnet primarily used in large adware schemes, but also for backdoor operations, brute-force attacks, and more.

The Stantinko group was historically primarily known for attacking Windows applications, but recent attacks have revealed that they are now working on evolving their Linux malware, with a new proxy Trojan masquerading as httpd, the Apache Hypertext Transmission Protocol Server that is used on several Linux servers.

“We believe that this malware is part of a broader campaign that uses compromised Linux servers,” say security researchers at Intezer.

Detected on VirusTotal by a single anti-virus engine, the sample is an unstripped 64-bit ELF binary that validates a configuration file upon execution. The malware prevents execution if this file is absent or lacks the expected structure.

The proxy daemonizes itself if the validation completes, in which it generates a socket and a listener that allows it to accept connections. This may be the way contaminated computers deal with each other, according to Intezer.

The new version, which was discovered almost three years after the previous one has a similar function, but reveals a variety of changes, including the command and control (C&C) IP address stored in the configuration file dropped next to the malware, the absence of the new version’s self-updating capability, and the dynamic connection of the new version.

Several feature names within the dataset have been shown to be similar to the previous version, but the current version does not call them statically. In addition, the C&C routes suggest the same group’s previous campaigns, indicating that the current Trojan is still related to Stantinko.

Source: https://cybersguards.com/stantinko-observed-using-a-new-version-of-a-linux-proxy-trojan/

Continue Reading

Cyber Security

GoDaddy Workers in Action Against Cryptocurrency Resources Hackers Trick

Avatar

Published

on

Hackers

After tricking GoDaddy employees into supplying them with keys to client accounts, cybercriminals were able to alter the DNS settings of certain cryptocurrency websites.

The event occurred earlier this month and impacted an undisclosed number of clients of the firm, including at least two websites connected to cryptocurrencies: the Liquid virtual currency exchange portal and the NiceHash crypto-mining operation.

On November 18, after GoDaddy wrongly turned over custody of their accounts, both platforms announced that threatening individuals were able to hack their internal networks.

Liquid CEO Mike Kayamori confirmed that the incident took place on November 13, and that the “ability to change DNS records and in turn, take control of a number of internal email accounts” was given to the threat perpetrator.

The malicious attacker thus damaged the resources of the trading network and also obtained access to record storage. As well as “preventing further intrusions and mitigating risk to customer accounts and assets,” the platform said it took the appropriate measures to contain the attack shortly after detecting it.

We will ensure that consumer funds are accounted for and remain safe and stable by containing the threat, reaffirming domain ownership, and carrying out a thorough review of our infrastructure. Kayamori said that MPC-based and cold storage crypto wallets are safe and have not been hacked.

NiceHash reported that the same GoDaddy problems triggered a service interruption on November 18th, and that the DNS records for the NiceHash.com domain were changed as a result of unauthorised access to the domain settings.”

After ensuring that funds were safe and customers had access to their accounts, the firm promptly froze all wallet operations and resumed its operation. Pending the outcome of an independent investigation into the incident, withdrawals were suspended.

“It looks like no emails, passwords, or any personal information has been accessed at this point in time, but we do suggest resetting your password and activating 2FA security,” the firm said last week.

In looking into the attack, investigative journalist Brian Krebs found that threatening perpetrators used social engineering to manipulate staff of GoDaddy into changing access to their accounts, and that their addresses were changed to privateemail.com for all the targeted accounts.

Cryptocurrency sites that may have been attacked by the same hacker community include Bibox.com, Celsius.network, and Wirex.app, in addition to Liquid and NiceHash.

The event seems to have been recognised by GoDaddy, claiming that only a limited number of clients were harmed, but not providing specifics about how the opponents attacked their staff.

Source: https://cybersguards.com/godaddy-workers-in-action-against-cryptocurrency-resources-hackers-trick/

Continue Reading
Esports2 hours ago

Super Smash Bros. Melee Slippi mod launches broadcast feature early in response to #FreeMelee

Esports2 hours ago

The 7 best low-back gaming chairs

Denmark
Esports3 hours ago

Heroic move past Endpoint in BLAST Premier Showdown

Esports4 hours ago

Na’Vi brings Mag back from inactive roster to coach Dota 2 team

Esports4 hours ago

Fantasy games live for DreamHack Masters Winter and Flashpoint 2 playoffs

Energy5 hours ago

Worldwide Hybrid Diesel Genset Industry to 2026 – Key Drivers and Restraints

Energy6 hours ago

The Neutrino Energy Group Transcends the Theoretical to Transform Practical Energy Use Worldwide

Energy7 hours ago

ChemPoint es seleccionado como distribuidor de los productos de Soluciones Especializadas de DuPont para México

Esports7 hours ago

Apex Legends Dev Believes Wattson Isn’t ‘Useless’

Esports7 hours ago

Horizon Voice Actor Shows What it Was Like to Record During the Pandemic

United States
Esports7 hours ago

Liquid edge past MAD Lions in BLAST Premier Fall Showdown

Energy7 hours ago

Europe Excavator Market Outlook Report 2020-2025 Featuring Prominent Players – Caterpillar, CNH, John Deere, Kobelco, Liebherr

Esports7 hours ago

Endpoint beat Sprout to win ESEA MDL Season 35, advance to ESL Pro League Season 13

Energy8 hours ago

$32.2 Billion Worldwide Soil Treatment Industry to 2027 – Impact of COVID-19 on the Market

Esports8 hours ago

Amazing Warzone Clip Shows Off Mind Games

Esports8 hours ago

Warzone Sniper Rifle Tier List November 2020

Esports8 hours ago

When Do FUT Champs Rewards Go Live?

AR/VR8 hours ago

A Wake Inn Pulls Those Trailer Strings Ahead of a 2021 Release

Esports8 hours ago

FIFA 21 La Liga POTM November Nominees and How to Vote

Esports8 hours ago

3-Man Squad Find Last Remaining Crypto Distracted in Drone Mode

Esports8 hours ago

Pokemon GO Black Friday Deals: Are There Any?

Esports8 hours ago

Nickmercs Potentially Interested in Returning to Competitive Fortnite

Energy9 hours ago

Outlook on the Solar Street Lighting Global Market to 2030 – Industry Trends and Growth Forecast

Energy9 hours ago

Global $410 Million Flexible Battery Market to 2027 by Components, Capacity, Voltage, Chargeability, Materials, Technology, Applications & Competitive Landscape

Esports9 hours ago

AC Valhalla Update 1.04: 3 Biggest Takeaways

Esports9 hours ago

5 Best Goal Songs In FIFA 21

Esports9 hours ago

Bots Buying PS5: How Bad Was It?

Energy9 hours ago

North America $1792.6 Billion Excavator Market Outlook to 2025

AR/VR9 hours ago

Working Up a Sweat With FitXR’s Dance Workouts

Energy10 hours ago

Global Excavator Market Overview 2020-2025

Trending