Zephyrnet Logo

Tag: computers

Free Amazon Gift Card? Just Say No!

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Android users throughout North American are being text message...

Want $3 Million? Find Botnet Admin Evgeniy Bogachev

Reading Time: 2 minutesIt is a sign of the times that a cyber criminal makes the FBI’s top 10 most wanted list. And...

Lenovo Users at Risk for Man-in-the-Middle Attacks from Superfish

Reading Time: 2 minutesLenovo has had some explaining to do this week. Lenovo has been shipping laptops and personal computers since 2010 with adware...

AOL Ad Networks Distributing Malvertising

Reading Time: 2 minutesIt was first reported in early January that AOL ad distribution networks were serving malware infected ads on high profile...

Zero Day Vulnerability in Adobe Flash Player Threatens Web Users

Reading Time: 2 minutesCriminals are using a new zero day vulnerability in the Adobe Flash Player to conduct drive-by-downloads, infecting unsuspecting web site...

The Age of Mobile Computing: 12 Steps to Protect Your Device

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app .store br{display:none;} Mobile devices are becoming ubiquitous. You can see that...

How to Remove the Dreaded Vosteran Browser Hi-Jacker

Reading Time: 2 minutesWhen is a computer virus not a computer virus? When it is Vosteran.It may enter your computer unnoticed and change...

Online Privacy and Security Concerns in an Age of Terror

Reading Time: 4 minutesOnce again, terror is in the news and dominates much of the national discussion. A major European city, the great...

Are Your Medical Records Secure From Fraudsters?

Reading Time: 3 minutesHealthcare is sure to be a hot topic in 2015 in the United States as the long delayed employer mandate...

Hollywood Whodunit: Who Hacked Sony?

Reading Time: 3 minutesMysteries are the most popular genre in books, movies and films. Everyone loves to solve a mystery and we now...

Webcam Vulnerability: Who is Watching Whom?

Reading Time: 2 minutesThe first video phone was a sensation at the 1939 World’s Fair, and again a quarter century later at the...

Apple Releases Security Updates to Address Many Vulnerabilities

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Apple released security updates for iOS devices, OS X Yosemite...

Latest Intelligence

spot_img
spot_img