Zephyrnet Logo

Tag: credit card

Alert: New PayPal Phishing Scam

Reading Time: 2 minutesComodo has identified a new PayPal phishing email, which is being sent via a server in Turkey. Because PayPal uses...

Free Amazon Gift Card? Just Say No!

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Android users throughout North American are being text message...

Is it time for “Always on SSL”?

Reading Time: 2 minutes SSL is widely used today to secure communication on web pages that send sensitive information to a web server, such...

Data Leaks? Plug Them with MyDLP

Reading Time: 2 minutesComodo has recently acquired MyDLP, a complete Data Loss Prevention (DLP) solution that provides Enterprise grade protection for organizations big...

Tips for Secure Shopping on Black Friday and Cyber Monday

Reading Time: 3 minutesTis the season to be jolly, and to do a lot of holiday shopping! It’s an important time for both...

Do You Need PCI Vulnerability Scanning?

Reading Time: 2 minutesWeb sites have never been more under attack by hackers and E-commerce sites are a prime target.  Right now,  do...

ATMs Vulnerable to Malware Breaches

Reading Time: 3 minutesIt is a commonly held myth that ATM machines are not vulnerable to the type of malware infections that plague...

Manually Removing an Autorun Virus

Reading Time: 3 minutesSo called “autorun viruses” were developed to infect external devices, such as infecting a victim’s PC while opening a flash...

Dairy Queen Data Breach: Backoff POS Malware Strikes Again

Reading Time: 2 minutesIt may be time to stop writing articles about point-of-sale data breaches and write about companies that have not had...

P.F. Chang Data Breach: New Details Emerge

Reading Time: 2 minutesOn August 4th, P.F. Chang released a statement from CEO Rick Federico with new information about the data breach identified...

E-Commerce in the Crosshairs: How to Keep Your Site Secure

Reading Time: 6 minutes If you have an e-Commerce site you are in crosshairs of hackers. Why? Because you are the goose with the...

How to Handle a Data Breach

Reading Time: 3 minutesThere is a right way and a wrong way for an organization to handle a data breach. Unfortunately, they are...

Latest Intelligence

spot_img
spot_img