{"id":241,"date":"2014-11-04T15:51:20","date_gmt":"2014-11-04T15:51:20","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=241"},"modified":"2020-08-18T23:39:11","modified_gmt":"2020-08-18T18:09:11","slug":"important-protect-poodle-attacks","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/important-protect-poodle-attacks\/","title":{"rendered":"Important: How to Protect Yourself Against POODLE Attacks"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-247\" style=\"margin-bottom: 30px;\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/poodle-snarl-large.jpg\" alt=\"poodle snarl large\" width=\"646\" height=\"749\" \/><br \/>\nPOODLE Attacks? That is the unlikely term for a serious threat to Internet users. Google has recently revealed that criminal hackers have identified a way, under certain circumstances, to force a client and server establishing a secured connection to use the outdated SSL 3.0 protocol.<\/p>\n<p>Hackers can exploit flaws in SSL 3.0 to intercept the messaging between the client (browser) and the server and &#8220;listen&#8221; to the conversation. This is called a &#8220;man-in-the-middle&#8221; attacks. Criminal hackers frequently use man-in-the-middle attacks to steal users login credentials and account information for banking and financial sites.<\/p>\n<p>During the attack, the victim may have no idea that something is wrong. They just check their account later and may have a very unpleasant surprise.<\/p>\n<p>This can effect both Windows and Mac users.<\/p>\n<p>You are not vulnerable if either your browser or the server you are connecting to has <a href=\"https:\/\/ssl.comodo.com\/\" target=\"_blank\">SSL<\/a> 3.0 turned off.<\/p>\n<p>The good news is that newer browsers have SSL 3.0 turned off by default, protecting you from this scenario. If you are not sure if your browser is vulnerable go to. If you see a cute terrier on the page you are safe. However, if you see a poodle you need to take action!<\/p>\n<p>To disable SSL 3.0 on Internet Explorer 9, do the following:<br \/>\n1) Select Tools (Alt+X)<br \/>\n2) Select &#8220;Internet Options&#8221;<br \/>\n3) Select the &#8220;Advanced&#8221; tab<br \/>\n4) In the Security group, uncheck &#8220;Use <a title=\"SSL\" href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/man-middle-coming\/\" target=\"_blank\" rel=\"noopener\">SSL<\/a> 3.0&#8243;<\/p>\n<p>The procedure will be similar on other browsers, but you may need to check the help system.<\/p>\n<p>Although the solution is simple, the threat is extremely dangerous. You could become the victim of identity theft and financial fraud or your computer could be infected with dangerous malware.<\/p>\n<p>Act now!\u00a0Install a <a href=\"https:\/\/antivirus.comodo.com\/free-antivirus.php\" target=\"_blank\" rel=\"noopener\">virus protection security suite<\/a> that could benefit the user in malware or virus scanning so as to protect the system from malicious threats to the fullest.<\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&#038;track=16678&#038;af=16678\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\"\/><\/a><\/p>\n<p><a href=\"https:\/\/secure.nurd.com\/home\/purchase.php?pid=109&#038;af=16166\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/08\/complete-antivirus.png\" alt=\"comodo antivirus\" width=\"650\" height=\"83\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>POODLE Attacks? That is the unlikely term for a serious threat to Internet users. Google has recently revealed that criminal hackers have identified a way, under certain circumstances, to force a client and server establishing a secured connection to use the outdated SSL 3.0 protocol. Hackers can exploit flaws in SSL 3.0 to intercept the [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":246,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,8],"tags":[54,53],"class_list":["post-241","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer-safety","category-how-to","tag-how-to-protect-poodle-attack","tag-poodle-attacks"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Important: How to Protect Yourself Against POODLE Attacks - Comodo Antivirus Blogs | Anti-Virus Software Updates<\/title>\n<meta name=\"description\" content=\"POODLE attacks? That is the unlikely term for a serious threat. Criminal hackers can force a client and server to use the outdated SSL 3.0 protocol.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/important-protect-poodle-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Important: How to Protect Yourself Against POODLE Attacks - Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"og:description\" content=\"POODLE attacks? That is the unlikely term for a serious threat. Criminal hackers can force a client and server to use the outdated SSL 3.0 protocol.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/important-protect-poodle-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2014-11-04T15:51:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-18T18:09:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/poodle-snarl-small.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"226\" \/>\n\t<meta property=\"og:image:height\" content=\"190\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/important-protect-poodle-attacks\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/important-protect-poodle-attacks\/\",\"name\":\"Important: How to Protect Yourself Against POODLE Attacks - Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/important-protect-poodle-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/important-protect-poodle-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/poodle-snarl-small.jpg\",\"datePublished\":\"2014-11-04T15:51:20+00:00\",\"dateModified\":\"2020-08-18T18:09:11+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"POODLE attacks? That is the unlikely term for a serious threat. Criminal hackers can force a client and server to use the outdated SSL 3.0 protocol.\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/important-protect-poodle-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/important-protect-poodle-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/important-protect-poodle-attacks\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/poodle-snarl-small.jpg\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/poodle-snarl-small.jpg\",\"width\":226,\"height\":190},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/important-protect-poodle-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Important: How to Protect Yourself Against POODLE Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Important: How to Protect Yourself Against POODLE Attacks - Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"POODLE attacks? That is the unlikely term for a serious threat. Criminal hackers can force a client and server to use the outdated SSL 3.0 protocol.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/important-protect-poodle-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Important: How to Protect Yourself Against POODLE Attacks - Comodo Antivirus Blogs | Anti-Virus Software Updates","og_description":"POODLE attacks? That is the unlikely term for a serious threat. Criminal hackers can force a client and server to use the outdated SSL 3.0 protocol.","og_url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/important-protect-poodle-attacks\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2014-11-04T15:51:20+00:00","article_modified_time":"2020-08-18T18:09:11+00:00","og_image":[{"width":226,"height":190,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/poodle-snarl-small.jpg","type":"image\/jpeg"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/important-protect-poodle-attacks\/","url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/important-protect-poodle-attacks\/","name":"Important: How to Protect Yourself Against POODLE Attacks - Comodo Antivirus Blogs | Anti-Virus Software Updates","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/important-protect-poodle-attacks\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/important-protect-poodle-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/poodle-snarl-small.jpg","datePublished":"2014-11-04T15:51:20+00:00","dateModified":"2020-08-18T18:09:11+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"POODLE attacks? That is the unlikely term for a serious threat. Criminal hackers can force a client and server to use the outdated SSL 3.0 protocol.","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/important-protect-poodle-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/computer-safety\/important-protect-poodle-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/important-protect-poodle-attacks\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/poodle-snarl-small.jpg","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/poodle-snarl-small.jpg","width":226,"height":190},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/important-protect-poodle-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Important: How to Protect Yourself Against POODLE Attacks"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/241","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=241"}],"version-history":[{"count":38,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/241\/revisions"}],"predecessor-version":[{"id":15103,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/241\/revisions\/15103"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/246"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=241"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=241"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}