Zephyrnet Logo

Tag: APT

Endpoint Security Glossary

Reading Time: 9 minutesHere’s an A to Z glossary of terms related to Endpoint Protection- A Advanced Persistent Threat (APT) – An unauthorized person gaining...

FROM THE COMODO LABS: Comodo Containment vs. Zeus/MitB

Reading Time: 4 minutesThe security engineers and IT experts from the Comodo Threat Research Labs are constantly analyzing the thousands of malware families...

Comodo Antivirus Conquers “Weapons Grade” Surveillance

Reading Time: 2 minutesWe are happy to report more independent evidence that you can sleep tight at night with Comodo Antivirus, even from...

Windows XP on ATMs: Should We Be Worried?

Reading Time: 2 minutesMicrosoft is working furiously to convince users of Windows XP to abandon the venerable operating system before they end support...

Data Security: Protecting Your Most Precious Asset

Reading Time: 3 minutesIn the late 80’s and 90’s, most of the projects I was involved with were about converting paper based systems...

Free APT Assessment: Are You Under Attack?

Reading Time: 2 minutesHistorically, hackers have cast a wide net.  They put viruses into “the wild” and  where they end up nobody actually...

Adobe Data Breach Gets Worse: Time to Change All Your Passwords?

Between Flash and PDF Reader alone, Adobe is ubiquitous on today’s desktop. Have you ever registered for an Adobe product? If you have,...

Will the mHealth Lollapalooza move us forward

The folks at the the UN Foundation's mHealth Alliance are thrilled at what is happening at their annual meeting this week in Washington,...

Latest Intelligence

spot_img
spot_img