Zephyrnet Logo

Tag: computers

Universities Go to School on Computer Security

Reading Time: 3 minutesCyber security at a university can be a very different challenge than in a corporate environment. With an ongoing wave...

Firefox 24: Mozilla Releases A More Secure Browsing Experience

Reading Time: 2 minutesMozilla Firefox, the most widely known open source web browser, has officially rolled out Firefox 24, the latest update with...

Mobile Antivirus Prevention Top Tips

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app There are tons of security tips provided online for the...

Mobile Antivirus Adoption Is Low, But Not For Long

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app An alarming report by the Gartner Group claims that consumers...

Mobile Antivirus and E-Authentication

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app With the surge in mobile phone market and the necessity...

PCI DSS Compliance: Failure is Not an Option

Reading Time: 3 minutesThere is an epidemic of identity theft and financial fraud hat is costing businesses and consumers millions of dollars per...

Why is Mobile Security Integral In Modern Era?

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Times have changed and what used to be luxury is...

Comodo Technical Report: Android OBAD Trojan Virus

Reading Time: 1 minuteUntil recently, it has been conventional wisdom that the operating systems for mobile devices are much safer than for desktop...

How to Use CIS Protocol Handlers

Reading Time: 2 minutesDid you know that COMODO Internet Security has its own protocol handlers that allow you to perform certain tasks from...

Java Zero-Day Exploits: Why I am STILL Not Worried.

Reading Time: 3 minutesLast Saturday, I was surprised to see a news story that Homeland Security is recommending that all desktop users disable...

Malware using your computer to make digital money

Reading Time: 4 minutesElectronic money (e-money) is being used more and more often by people to make online purchases. And sure as night...

If the White House Has Trouble With Hackers, Everyone is at Risk

Reading Time: 2 minutesAccording to the noted National Security expert Bill Gertz, White House computers have been compromised by hackers, probably from China,...

Latest Intelligence

spot_img
spot_img