Zephyrnet Logo

Tag: computers

Matousec’s Challenge

Reading Time: 2 minutes We have been very proud of the performance of Comodo Internet Security in the Matousec.com “Proactive Internet Security Challenge 64”...

An Intro to Spyware and Trojans

Reading Time: 2 minutesOnline shopping, online banking and general storage of personal information on personal computers have made consumers more vulnerable to identity...

Internet Explorer 10 Exploit Used to Target U.S. Military

Reading Time: 2 minutesThe US military may be trained to dodge bullets and bombs, but now they are being targeted with bits and...

Windows Systems: 6 Ways to Keep Your Network Secure

Reading Time: 2 minutesMicrosoft Windows is the dominant operating system in business organizations for desktops and intranet servers. It is also the number...

CryptoLocker 2.0 – Are You Ready? We Are

Reading Time: 4 minutesWhile other security companies and their users are still struggling to deal with the infamous ransomware Cryptolocker, we have no...

Case Study: Fetco Home Decor Calls Comodo for Help

Reading Time: 2 minutesWhat do you do when your network is infected and nothing you do can get rid of the problem? Fetco™...

Target Data Breach: Much Worse Than We First Knew

Reading Time: 2 minutes The Target data breach is a story that is not going to go away anytime soon. When Target first reported the...

Yahoo Ad Servers Dish Malvertising

Reading Time: 2 minutes Millions of unsuspecting users were injected with malicious malware content because a number Yahoo’s advertising servers were compromised with malvertising....

Outdated Credit Card System Threatens US Retailers

Reading Time: 2 minutes It’s time for a change. The current credit card system has proven exceptionally vulnerable to breaches due, in part, to outdated...

Target Data Breach: PCI Scanning More Important Than Ever

Reading Time: 3 minutes Retailers, like Target,  that accept bank cards are required to adhere to a strict set of standards for protecting the...

Comodo Announces Enhancements to Storage Solutions

Reading Time: 3 minutes Comodo  announced  today  that our range of backup and cloud storage solutions have undergone recent  enhancement.  The Comodo Cloud...

Digital Email Certificates: Is Your Email Worth Protecting?

Reading Time: 2 minutesHow important is your email communication? Would it be a problem if someone intercepted it? What if someone modified it...

Latest Intelligence

spot_img
spot_img