Zephyrnet Logo

Tag: computers

AOL Ad Networks Distributing Malvertising

Reading Time: 2 minutesIt was first reported in early January that AOL ad distribution networks were serving malware infected ads on high profile...

Zero Day Vulnerability in Adobe Flash Player Threatens Web Users

Reading Time: 2 minutesCriminals are using a new zero day vulnerability in the Adobe Flash Player to conduct drive-by-downloads, infecting unsuspecting web site...

The Age of Mobile Computing: 12 Steps to Protect Your Device

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app .store br{display:none;} Mobile devices are becoming ubiquitous. You can see that...

How to Remove the Dreaded Vosteran Browser Hi-Jacker

Reading Time: 2 minutesWhen is a computer virus not a computer virus? When it is Vosteran.It may enter your computer unnoticed and change...

Online Privacy and Security Concerns in an Age of Terror

Reading Time: 4 minutesOnce again, terror is in the news and dominates much of the national discussion. A major European city, the great...

Are Your Medical Records Secure From Fraudsters?

Reading Time: 3 minutesHealthcare is sure to be a hot topic in 2015 in the United States as the long delayed employer mandate...

Hollywood Whodunit: Who Hacked Sony?

Reading Time: 3 minutesMysteries are the most popular genre in books, movies and films. Everyone loves to solve a mystery and we now...

Webcam Vulnerability: Who is Watching Whom?

Reading Time: 2 minutesThe first video phone was a sensation at the 1939 World’s Fair, and again a quarter century later at the...

Apple Releases Security Updates to Address Many Vulnerabilities

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Apple released security updates for iOS devices, OS X Yosemite...

Milestone: Comodo AntiSpam Gateway Filters 100th Million Emails

Reading Time: 2 minutesComodo announced today announced that our Cloud-based AntiSpam Gateway (ASG) service filtered its 100 millionth email last month with over...

POS Under Attack: The Why, How & What to Do

Reading Time: 4 minutesOver the past year, there have been an alarming number of high profile data breaches of customer cardholder and personal...

Keeping Kids Safe Online

Reading Time: 3 minutesParents have the responsibility of teaching their kids right from wrong, caring for and protecting them at all costs, right?...

Latest Intelligence

spot_img
spot_img