App Review Malware bypass Comodo Firewall @ CS settings

It is advised to take all reviews with a grain of salt. In extreme cases some reviews use dramatization for entertainment purposes.

Av Gurus

Level 29
Thread author
Verified
Honorary Member
Top Poster
Malware Hunter
Well-known
Sep 22, 2014
1,767
I know about that (I even have 2 reg files on my PC, one is Enable and other is Disable that reg options) but for my it is a little pain in the A**, because I have some portable APP which don't work with that setup so I must every time turn ON/OFF that, but for others is a very good security options.
 

AtlBo

Level 28
Verified
Top Poster
Content Creator
Well-known
Dec 29, 2014
1,711
Appreciate the effort everybody put in this thread. Went back and reread the posts. Hope Comodo looks into trust and refines/hardens their view of trust within the TVL and with the files list. I feel like the program would be easier to understand if there were fewer options for a user to introduce trust into the Files List. Especially this is true for unsigned files and executables...I mean Comodo products could surely hard and fast create "Unrecognized" Allow rules for unsigned if user wants to run them (or "Unrecognized" block rules if user wants to block). Also, user could easily then reference which unsigned are being allowed through the container with a simple add on from Comodo...any unsigned and uncontained or otherwise "Unrecognized" by Comodo together in one window. This could be extended to include allowed command lines. The great thing is that other protections ideally could remain in place or be set to be in place (i.e. HIPS doesn't trust unsigned period) and Heuristics is always on the job. O/C there is firewall. Thx for good information everyone.
 
  • Like
Reactions: bribon77

JoseyWales

Level 1
Verified
Jul 23, 2018
33
Well we're approaching a year since the gross errors were discovered in Comodo's security settings. What are the general opinions now with ver 10 and 11....
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top