I have a scenario:
What if an attacker created malware and then submitted it to COMODO
as a safe application?
Does he have chance of success ?
Also, the other way around? (good app reported as malware)
Or, is each submitted file manually analyzed?
Curious…