Zephyrnet Logo

Tag: Credentials

Homeland Security: Symantec Web Gateway Vulnerable

Reading Time: 1 minuteAccording to Homeland Security’s Computer Emergency Response Team (US-CERT), the Symantec Web Gateway contains SQL injection and cross-site scripting vulnerabilities. Symantec...

Law Enforcement: You Have Only 2 Weeks to Protect Yourself

Reading Time: 4 minutes On Monday, the US Department of Justice announced that law enforcement working in multiple countries had successfully seized control of...

Customer Data Breach: eBay Joins a Growing List of Hacked Companies

Reading Time: 2 minuteseBay Inc. issued a public statement today asking customers to change their web site passwords due to a breach of...

Heartbleed Bug: Comodo Urges OpenSSL Users to Apply Patch

Reading Time: 3 minutesIn response to a reported vulnerability in the popular OpenSSL cryptographic library, Comodo is urging its customer, partners and all...

Comodo AV Labs Identifies Dangerous Zeus Banking Trojan Variant

Reading Time: 4 minutesComodo Antivirus Labs has identified a new and extremely dangerous variant of the Zeus banking Trojan. Hackers use Zeus to...

Is that IRS Email Really from a Phisherman?

Reading Time: 2 minutesMillions of Americans are working hard these days to finalize their tax returns before the annual April 15th deadline. With...

Windows Defender: Minimal Defense, Maximum Risk

Reading Time: 3 minutesIf you are confused about what Antivirus protection is provided by Windows, don’t feel bad. Microsoft has changed its strategy...

Stay Away from the Man in the Middle

Reading Time: 3 minutesWhen you were a kid, presuming that you have indeed grown up, did you ever play the game “Man in...

ZeuS Banking Trojan Surfaces Again, and Again

Reading Time: 3 minutesThe notorious ZeuS Banking Trojan seems to be immortal, like its Greek God namesake. In December it was reported that...

Yahoo Suffers Email Account Data Breach, Again

Reading Time: 1 minuteYahoo was the first internet email account I ever used, way back in the late 1990’s. I used that account...

Beware of Fake Filezilla!

Reading Time: 1 minuteOpen source software is great, especially the part about being able to use it without paying a license. The underlying...

Data Security: Protecting Your Most Precious Asset

Reading Time: 3 minutesIn the late 80’s and 90’s, most of the projects I was involved with were about converting paper based systems...

Latest Intelligence

spot_img
spot_img