Zephyrnet Logo

Tag: discovered

ATMs Vulnerable to Malware Breaches

Reading Time: 3 minutesIt is a commonly held myth that ATM machines are not vulnerable to the type of malware infections that plague...

Warning! RATS Attacking Mobile Devices

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app When it comes to securing a digital device, antivirus is...

What You Need to Know About the Celeb Nude Photos Breach

Reading Time: 2 minutes When you are a celebrity you want exposure, but Apple’s iCloud has given a list of some of Hollywood’s top...

Home Depot Data Breach Rocks Retail

Reading Time: 2 minutesWhen will the wave of POS data breaches that have been rocking American retail recently end? Not today, as retail...

Homeland Security Warns Backoff POS Malware Speading Fast

Reading Time: 2 minutesIn July, Homeland Security warned of the Backoff POS malware threat, which has the ability to steal cardholder data and...

Homeland Security: POS Malware “Backoff” Threatens Retail

Reading Time: 2 minutesAs if retail operations had enough to worry about with the wave of highly published data breaches, US Homeland Security...

P.F. Chang Data Breach: New Details Emerge

Reading Time: 2 minutesOn August 4th, P.F. Chang released a statement from CEO Rick Federico with new information about the data breach identified...

A Major League Data Breach: Houston Astros Strike Out!

Reading Time: 2 minutesIt’s been a rough few years for the Houston Astros baseball team on the field, in last place half way...

PF Chang Data Breach: More Questions than Answers

Reading Time: 2 minutesThere are two disturbing bits of news this week regarding the recently revealed cardholder data breach at PF Chang, the...

BredoLabs: A Classic Botnet Story

Reading Time: 3 minutesBredoLabs is the name of both a trojan horse program and the largest botnet ever discovered.  The botnet has been...

Authentication Solutions: Beyond the Password

Reading Time: 2 minutesAuthentication solutions prevent fraudulent account access risks. They also enable compliance with many security, banking and privacy regulations. What is Authentication? Authentication...

Case Study: Fetco Home Decor Calls Comodo for Help

Reading Time: 2 minutesWhat do you do when your network is infected and nothing you do can get rid of the problem? Fetco™...

Latest Intelligence

spot_img
spot_img