Zephyrnet Logo

Tag: computers

Target Data Breach: Much Worse Than We First Knew

Reading Time: 2 minutes The Target data breach is a story that is not going to go away anytime soon. When Target first reported the...

Yahoo Ad Servers Dish Malvertising

Reading Time: 2 minutes Millions of unsuspecting users were injected with malicious malware content because a number Yahoo’s advertising servers were compromised with malvertising....

Outdated Credit Card System Threatens US Retailers

Reading Time: 2 minutes It’s time for a change. The current credit card system has proven exceptionally vulnerable to breaches due, in part, to outdated...

Target Data Breach: PCI Scanning More Important Than Ever

Reading Time: 3 minutes Retailers, like Target,  that accept bank cards are required to adhere to a strict set of standards for protecting the...

Comodo Announces Enhancements to Storage Solutions

Reading Time: 3 minutes Comodo  announced  today  that our range of backup and cloud storage solutions have undergone recent  enhancement.  The Comodo Cloud...

Digital Email Certificates: Is Your Email Worth Protecting?

Reading Time: 2 minutesHow important is your email communication? Would it be a problem if someone intercepted it? What if someone modified it...

Kelhios: The Vampire of Botnets

Reading Time: 3 minutesA botnet, a network of unwillingly controlled computers, is sometimes called a Zombie network. That’s because, like “real zombies” the computer...

Firefox 26 Delivers Security Fixes & Java Click to Play

Reading Time: 2 minutesDelivering multiple updates and security fixes, a new version of the popular browser from Mozilla has arrived this week. Firefox...

Is Your Healthcare Data Safe With the Government?

Reading Time: 2 minutesAs the country begins the full implementation of the Affordable Care Act, which coincides with the government effort to digitize...

Not So Funny: Cracked Humor Site Serves Drive By Malware

Reading Time: 2 minutesSomething funny was going on at the Cracked Humor web site recently, and many site visitors were not amused.Recently, the...

PCI DATA SECURITY STANDARDS: BEYOND COMPLIANCE

Reading Time: 2 minutesThere is an epidemic of identity theft that is costing businesses and consumers millions of dollars per year. Most of...

Watch Your Plugins: Silverlight at Risk

Reading Time: 1 minuteAs if we needed it, we have more proof that the black hats never rest. An already notorious exploit kit...

Latest Intelligence

spot_img
spot_img