CryptoLocker Ransomware Continues to Claim Victims While Enterprises Remain Safe with Comodo Endpoin

    Date18 Nov 2013
    CategoryLatest News
    Posted ByAnthony Pell
    Comodo, a leading Certificate Authority and Internet security organization, today announced that their Comodo Endpoint Security Manger software proactively protects against endpoints from getting hit by the CryptoLocker ransomware. CryptoLocker is a Trojan that is spread mainly through fake emails that mimic the look of legitimate businesses or via phony FedEx and UPS tracking notices. Once the user opens the malicious message, CryptoLocker installs itself on the user's system, scans the hard drive, and encrypts the files. All files are rendered inaccessible to the user until he or she pays a ransom to receive a decryption key.

    ESM and its Comodo Endpoint Security (CES) software is able to assist in preventing threats including the CryptoLocker ransomware by isolating all unknown applications (malicious or not). If the threat is known to be malicious, the Antivirus (AV) will detect the signature and prevent the encryption of your files. If the threat is unknown, the HIPS and Auto-Sandbox will intercept it and stop it from contaminating the underlying operating system. Therefore, even before CryptoLocker became a known virus, CES would automatically sandbox it to prevent encryption of your files.

    "CESM 3 is truly next generation in proactive endpoint security" said Mich

    You are not authorised to post comments.

    LinuxSecurity Poll

    Do you reuse passwords across multiple accounts?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).


    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.