Sales
0161 215 3700
0800 458 4545
Support
0800 230 0032
0161 215 3711

Comodo launches Memory Firewall

Comodo launches Memory Firewall

Comodo, a security company, announced a new security solution to prevent buffer overflow attacks from damaging users computers.

It explains that buffer overflow attacks are often used by ID stealing thieves to deliberately cause the buffer overflow to crash a computer which creates the opportunity for the hacker to then run malicious code and even gain control of the entire operating system.

The company also claims that their Memory Firewall is a prevention tool which is free and prevents most (90+%) buffer overflow attacks.

Company states that buffer overflow attacks are difficult to detect because these attacks can be launched just by visiting a site.

To attack a computer, a malicious program or script deliberately sends more data to its memory buffer than the buffer can handle leaving the system vulnerable to malware that can reformat the hard drive, steal sensitive user information, or even install programs that transform the machine into a Zombie PC.

The company further affirms that since their Memory Firewall detects most buffer overflow attack attempts such as attacks on STACK memory, HEAP memory, ret2libc attacks and of corrupted/bad SEH Chains, Comodo Memory Firewall protects against data theft, computer crashes and system damage by preventing most types of buffer overflow attacks.

Company along with Comodo Memory Firewall is working on Comodo Firewall Pro, rated by PC Magazine and CNET. It also believes that together, these two free solutions deliver a preventative model for unparalleled desktop security that prevents malware from ever gaining access to a system in the first place.

"At Comodo, we have changed the model of how users' PC are protected", Melih Abdulhayoglu, CEO and Chief Security Architect of Comodo said. "Today, we deliver prevention-based security by only granting access to applications that we know to be trusted.

This model is unique and mitigates threats because we are not trying to Identify malware per se as it is constantly changing. Rather, we built technology to enable the system to know what can be trusted.

This avoids potentially damaging applications from ever being in a position to harm computers. That's how PC can remain free from malware, and we are ones to deliver this level of technological innovation for free."


print this article

Return to hosting news headlines
View Hosting News Archive

Share with: