
Well, I of course agree with you Comodo itself would be the main target than its users, I’m just randomly reading websites and some says ddos also can be used for install malware and steal data, e.g. If you yourself were to be targeted by a DDoS attack then there’s nothing a local program on your computer can really do… I read that google could easily overcome such an attack, so I just got interested if the security suite I use can too…ĭDoS (Distributed Denial of Service) is not the same as hacking, DDoS is simply overflowing the target with bogus data so legitimate data doesn’t get through or gets slowed down significantly (might be a tad oversimplified) During a DDoS attack against Comodo servers then “Protecting their users” would be irrelevant since there’s nothing to protect them from, rather Comodo would be more interested in protecting themselves from going offline.Įdit: If Comodo were to be targeted by a DDoS attack then the worst case scenario for you as a user is no antivirus definition updates as well as no cloud lookup, that’s not as bad as it sounds since unknown malware would still be sandboxed (In the case of CIS and default settings) If servers get hacked can’t users got hacked too via their Comodo programs for example. Apart from file backups, PC security researchers strongly advise the use of a security program that is always fully up-to-date.Comodo servers. Having backups ensures that computer users can respond to a Ransomware infection by restoring the compromised data from the backup copy instead of complying with the criminals' demands. Therefore, the best protection against threats like the Ransomware is to have backup copies of all files and store these backups on the cloud or another safe device. Unfortunately, when threats like the Ransomware attack the computer files, they may not be recoverable without having the decryption key required.

However, instead of complying with the criminals' demands, computer users should make sure that they have the means to restore any files that become compromised by the Ransomware Trojan attack.

The Ransomware provides the victims with various instructions in its ransom note.
