Zephyrnet Logo

Tag: Criminal

Beware Your Inbox! Government Reports New Email Phishing Scams

Reading Time: 2 minutesOne of the most dangerous places on earth maybe your email inbox, considering the number of sophisticated email scams underway....

Sandboxing is Nice. Auto-Sandboxing is Essential

Reading Time: 2 minutesThe problem with conventional antivirus software is that they are like a bomb disposal unit that has not yet figured...

Online Privacy and Security Concerns in an Age of Terror

Reading Time: 4 minutesOnce again, terror is in the news and dominates much of the national discussion. A major European city, the great...

Are Your Medical Records Secure From Fraudsters?

Reading Time: 3 minutesHealthcare is sure to be a hot topic in 2015 in the United States as the long delayed employer mandate...

Hollywood Whodunit: Who Hacked Sony?

Reading Time: 3 minutesMysteries are the most popular genre in books, movies and films. Everyone loves to solve a mystery and we now...

How to Remove Awola Rogue Anti-Spyware

Reading Time: 3 minutesOne of the most popular malware programs used by criminal hackers to defraud computer users is called Awola.  Awola and...

Oracle Battles BASH Bug with Much Work Left to Do

Reading Time: 1 minuteOracle has released security updates to address BASH bug vulnerabilities found across multiple products. However, Oracle also included in its...

JPMorgan Chase Breach: Part of a Russian Cyberwar?

Reading Time: 2 minutesThe news last week that 76 million household customers and 7 million business customers of JPMorgan may have had their...

Comodo Antivirus Conquers “Weapons Grade” Surveillance

Reading Time: 2 minutesWe are happy to report more independent evidence that you can sleep tight at night with Comodo Antivirus, even from...

CHS Data Breach: 4.5 Million at Risk of Identity Theft

Reading Time: 1 minuteAccording to a July 2014 regulatory filing, Community Health Systems (CHS), who operates over 200 hospitals in 28 states, disclosed...

Comodo AV Labs Identifies Phishing Scam Targeting Gamers

Reading Time: 6 minutesContributors: Ionel Pomana, Kevin Judge Video games have played an important role in the history of computers and are a...

Law Enforcement: You Have Only 2 Weeks to Protect Yourself

Reading Time: 4 minutes On Monday, the US Department of Justice announced that law enforcement working in multiple countries had successfully seized control of...

Latest Intelligence

spot_img
spot_img