Zephyrnet Logo

Tag: browser

WindowSecurity.com: Comodo ESM Reader’s Choice 1st Runner-up

Reading Time: 3 minutesWhen we released Comodo Endpoint Security 3.0 in February 2013, we believed that its groundbreaking features would make it a...

Comodo Releases Internet Security 7: The Best Gets Better!

Reading Time: 2 minutesComodo Internet Security (CIS) is a robust suite of computer security systems, including a firewall and multiple layers of defense...

Comodo AV Labs Identifies Dangerous Zeus Banking Trojan Variant

Reading Time: 4 minutesComodo Antivirus Labs has identified a new and extremely dangerous variant of the Zeus banking Trojan. Hackers use Zeus to...

Filing Tax Returns? Look for the Green Browser Bar

Reading Time: 1 minuteComodo advises taxpayers who file individual income tax returns online through an Authorized IRS e-file provider to be sure that...

Windows Defender: Minimal Defense, Maximum Risk

Reading Time: 3 minutesIf you are confused about what Antivirus protection is provided by Windows, don’t feel bad. Microsoft has changed its strategy...

Browser Hijacking: Don’t be a Victim

Reading Time: 2 minutesOne of the most annoying and often dangerous computer compromises is browser hijacking. You probably have experienced it. A program...

Firefox 28 Provides Critical Security Patches

Reading Time: 1 minuteFirefox 28, released on Tuesday, provided numerous important security fixes including 5 for flaws identified in the recent Pwn2Own competition. Pwn2Own...

Why is SSL Certificate Browser Compatibility so Important?

Reading Time: 1 minuteSSL Certificates will only be recognized by a browser if the Root Certificate of the CA is present within the...

BredoLabs: A Classic Botnet Story

Reading Time: 3 minutesBredoLabs is the name of both a trojan horse program and the largest botnet ever discovered.  The botnet has been...

Measuring the Social Media Popularity of Pages with DEA in JAVA

March 3, 2014 Vasilis Vryniotis . No comments In the previous article we have discussed about the Data...

Stay Away from the Man in the Middle

Reading Time: 3 minutesWhen you were a kid, presuming that you have indeed grown up, did you ever play the game “Man in...

Apple Leaves Snow Leopard in the Cold, Users Vulnerable

Reading Time: 2 minutes Unlike their desktop/laptop rival Microsoft, Apple does not go out of its way to alert their user base that...

Latest Intelligence

spot_img
spot_img