Zephyrnet Logo

Tag: Cybersecurity

How to Protect Yourself from Printer/Scanner Malware

Reading Time: 3 minutes In a rather new trend, cybercriminals have begun to spread malware by spoofing printers and scanners. These types of attacks started...

Comodo protects five universities from new malware that steals data

Reading Time: 5 minutesIn the first few weeks of 2018, cybercriminals targeted five universities, 23 private companies and several government organizations. Despite the...

Comodo’s 2018 Cybersecurity Predictions: Smart Infrastructure Security, SSL Everywhere, The Rise of AI and More

Reading Time: 4 minutes Cybersecurity in 2017 was a long, winding road with many surprising obstacles. Every other week, there seemed to be a...

Comodo Threat Intelligence Lab Update – Cyber Monday

Reading Time: 2 minutes Globally, on Monday, November 27th… Cyber-Monday… the Lab saw a massive spike in detections. The reason? Cyber Monday deals lead...

Ovum Research: Protecting Endpoints with Containment, Cloud Now “On the Radar”

Reading Time: 2 minutes A new research note profiling the unique auto-containment + Cloud analysis approach to endpoint protection in Advanced Endpoint Protection was...

Cyberstrategy for 2018: Time to Prepare for the Worst?

Reading Time: 2 minutes Are you ready for 2018?  If you were not a headline in the 2017 blizzard of cyber breaches, then you’re better...

Comodo Q3 2017 Threat Report: Comodo Detects Malware in Every Country on Earth

Reading Time: 3 minutes In Q3 2017, Comodo Threat Research Labs (CTRL) detected nearly 400 million malware incidents from around the world – and...

What’s Next for Melih Abdulhayoglu?

Reading Time: 3 minutes Melih took on the giants of the PKI certificate business and bested them, by creating the world’s leading certificate authority. Now...

How to increase your cyber security by asking three easy questions

Reading Time: 2 minutesEvery cybersecurity responsible person knows the power of paranoia. Assume nothing, test everything, and then do it again. Here are three...

Threat Lab Exclusive: If Your Copier / Scanner Calls, Don’t Answer!

Reading Time: 5 minutesUPDATE AND CORRECTION: Konica Minolta C224e is not sending you dangerous phishing emails. Malicious hackers have created an email and file...

The Analyst View: Facts and (Science) Fiction for IT Security

Reading Time: 2 minutesIndustry Analysts and “Experts” are sometimes wrong.    Sometimes very wrong.  Like with a weather man I heavily discount their predictions,...

The Cost of “Free” Public Wifi

No, we don’t mean to say that free public wifi(s) are no longer free. They will be as long as you have hotels,...

Latest Intelligence

spot_img
spot_img