Question for any Comodo insider. I have seen the videos and all, but how specifically does Comodo protect from weaponized documents? Does it wait for the download file, does this happen via another mechanism, such as "heuristic command line monitoring".
One other angle on this. I am wondering if Comodo HIPs views activity of MS Office files as unrecognized or as a trusted part of a trusted application.
One other angle on this. I am wondering if Comodo HIPs views activity of MS Office files as unrecognized or as a trusted part of a trusted application.