Zephyrnet Logo

Tag: computers

The WannaCry Ransomware Attack: Combating Ransomware is Possible

Reading Time: 2 minutesWannaCry, the ransomware that attacked networks in many leading healthcare organizations and other organizations across the globe on Friday, is...

Blockchain use cases proliferate, but to whose benefit not yet clear

When Brian Behlendorf learned that blockchain technology was being applied to a land registry project in Honduras,... the proverbial lightbulb went on. Land...

Endpoint Security Glossary

Reading Time: 9 minutesHere’s an A to Z glossary of terms related to Endpoint Protection- A Advanced Persistent Threat (APT) – An unauthorized person gaining...

Latest Wikileaks Document Dump: Comodo is a Pain for Hackers

Reading Time: 2 minutesThe latest news regarding Wikileaks documents from the CIA has caused quite an industry stir, and also caught Comodo’s attention...

Professor Evans & his Essay On the Impossibility of Virus Detection

Reading Time: 3 minutesWhy Is Computer Security So Hard? On the Impossibility of Virus Detection Professor Dave Evans teaches Computer Science at the University of...

Comodo One. Understanding Windows Profiles in ITSM

Reading Time: 36 minutesComodo One. Understanding Windows Profiles in ITSM How to hide/show security client and communication client tray icons in devices? Step 1: Go...

What I learned at the 2017 DLD Conference in Munich

Hey there, Vasco here. A few months ago, I was invited to be a speaker at DLD17 in Munich, from the 15th to...

5 Ways To Raise Funds For Your Startup

Credit "Fundraising is going to be the death of me," said Tom Walker, President and CEO of Rev1 Ventures, in an interview with Dave...

Warning! Your Headphones may be Functioning as a Microphone!

Reading Time: 2 minutesA new kind of malware can turn speakers to microphones. Dubbed “SPEAKE(a)R” it can also make computers eavesdrop on the...

Fed Gov Speaks Up on HAVs, Google’s Allo Chats Smarter, and More – This Week in Artificial Intelligence 9-23-16

1 – Self-Driving Cars: Feds Release Long-Awaited RulesOn Tuesday, the federal government released its long-anticipated new rules for self-driving cars. In a press release,...

Stealing Data from Locked PCs Possible Using USB Device

Reading Time: 3 minutesThis should come as a surprise, a mild or perhaps not-so-mild shock, to those many people who lock their computer...

When DDoS Attacks, Botnets Play Mischief

Reading Time: 2 minutesDDoS attacks (Distributed Denial of Service attacks) and the data breaches that accompany such attacks are of serious consequence; these...

Latest Intelligence

spot_img
spot_img