https://forums.comodo.com/news-announcements-feedback-ccav/comodo-cloud-antivirus-v115435958619-released-t121196.0.html;msg870305;boardseen#new
Hi All,
We are pleased to announce availability of Comodo Cloud Antivirus - v1.15.435958.619.
Thank you for all the feedback during test builds.
https://download.comodo.com/ccav/installers/ccav_installer.exe
Size: 9.42 MB (9,886,464 bytes)
MD5: 291BA090B251C1296159BD5424C69436
SHA-1: 674251E05C93049540905D11A41F5A7CC6370083
At this moment we have made this available on website for new installations only.
We will release updates to older versions later this week.
If you want to update older version, you can have following (c:/windows/system32/drivers/etc/hosts) hosts entries and then run updater from main interface:
Code: [url=][Select][/url]
91.209.196.83 download.comodo.com
91.209.196.83 www.download.comodo.com
The focus of this release is to improve usability and here are the changes:
1)
Improved Usability with Clipboard Based Protection:
Earlier you could not copy-paste in and out of Sandboxed applications. We have made two changes in this regard:
a - You should be able to copy text from sandboxed application to outside Sandbox. This is by default.
b- If you want to paste text from application running outside sandbox in application running inside sandbox, we have added a new check box in Sandbox Settings as "Enable clipboard access to Sandboxed applications", de-selected by default, as we don't want a Sandboxed applications to have access to passwords from outside. So if you want to paste text in a sandboxed application, you can select check box and be able to paste in.
2)
Improvised message for possible file-less malware cases:
We introduced support of file-less malware in v594 in similar fashion as we have in CIS. But as one of CIS users pointed here, he didn't have enough information to act on alert.
So we have improved message and user will know as exactly what was the application that executed another application and passed command line params. Please see attached snaps of alert. We are further working in this area to auto analyze and block true cases of file-less malware.
3)
Improvised handling of sandboxed PDF cases:
We had two problems in there:
a. When PDF executed in Sandbox, e.g. launched from email client, user had no idea as why pdf will be Sandboxed.
b. When PDF running in Sandbox is saved, it ended up saved as in Sandbox itself, so user could not find it. And it could be very confusing.
In this release, we have improvised the message user sees when pdf is sandboxed and also, in case you save PDF, it will always be saved outside Sandbox. The reason is, if you trust the PDF, natural reaction would be to save it, that means user trusts the PDF.
4)
Exception list of applications in case of conflict with CCAV
This version uses a server based configuration file allowing to define list of applications, which can be excluded from CCAV in case of conflict as a quick fix; while team can resolve conflict in next releases. This will be internal list and be updated when program updates are checked.
We are working on next release where our focus is to make file-less malware and script sandbox alert cases only when there is a real possible threat and also improve visibility of files in Sandbox, so you can easily move files out if needed.
Thank you for all your support.
Please share your feedback.
Thanks
-umesh
|