Zephyrnet Logo

Tag: databases

Samsung Pay flaw that could be exploited by hackers

Reading Time: 3 minutesSamsung Pay reportedly has security flaws, as serious as POS security flaws, that could help hackers skim credit cards wirelessly...

Recent Features and 2016 Roadmap

An update from the MultiChain factory floorAs a change from blog posts about blockchains in general, I’d like to provide an update on...

FROM THE COMODO LABS: What’s old is new again, as that e-fax could contain CryptoLocker

Reading Time: 5 minutesSince 2013, the CryptoLocker malware has been making its way across the Internet in various forms, in various iterations. CryptoLocker...

Moving on from big blockchains

What we gain in flexibility by losing proof of workWhen it comes to using blockchains for inter-enterprise coordination, there’s an elephant-sized problem in...

Avoiding the pointless blockchain project

How to determine if you’ve found a real blockchain use caseBlockchains are overhyped. There, I said it. From Sibos to Money20/20 to cover...

Ending the bitcoin vs blockchain debate

Is there any value in a blockchain without a cryptocurrency? The debate has been running for a while but the past month has seen...

Oracle Issues Massive Critical Patch Update

Reading Time: 2 minutesOracle released its so call Critical Patch Update yesterday for numerous products and critical flaws that need to be addressed....

Using BIND DNS? Critical Updates are Required

Reading Time: 2 minutesThe Internet Systems Consortium (ISC) has released security updates to address multiple vulnerabilities in BIND, one of which may allow...

New open-source Machine Learning Framework written in Java

October 19, 2014 Vasilis Vryniotis . 5 Comments I am happy to announce that the Datumbox Machine Learning...

Understanding the EV SSL Certificate Process

Reading Time: 3 minutesExtended Validation SSL Certificates are the most recent innovation in SSL Certificates. EV SSL certificates combat online threats that erode...

E-Commerce in the Crosshairs: How to Keep Your Site Secure

Reading Time: 6 minutes If you have an e-Commerce site you are in crosshairs of hackers. Why? Because you are the goose with the...

Penetration vs VulnerabilityTesting: Do You Know the Difference?

Reading Time: 2 minutesEvery time you turn around, it seems there is another high profile data breach in the news that involves the...

Latest Intelligence

spot_img
spot_img