Zephyrnet Logo

Tag: discovered

Threat Lab Exclusive: If Your Copier / Scanner Calls, Don’t Answer!

Reading Time: 5 minutesUPDATE AND CORRECTION: Konica Minolta C224e is not sending you dangerous phishing emails. Malicious hackers have created an email and file...

115 – The Most & Least Valuable Habits for Creators

Two habits. One is extremely common among creators and not only worthless… but actually will cost you. The other, far less common, though...

Essential Patch Management Practices To Safeguard Your Data

Reading Time: 3 minutesSafeguarding the data environment is of prime importance to any enterprise. Breach of data can lead to loss of business...

Comodo Discovers Equifax Executives’ Passwords for Sale on the Dark Web

Reading Time: 2 minutesFollowing the Equifax data breach revelations, the Comodo Threat Intelligence Lab undertook a Dark Web analysis on the company and...

2nd Wave of IKARUS Ransomware Attacks Uses Your Scanner/Printer, Post Office Billing Inquiry

Reading Time: 4 minutesShould you fear your office scanner/printer? How about your post office? A second wave of new but related IKARUSdilapidated Locky ransomware...

Comodo publishes strategic analysis of 97M malware incidents in Q2

Reading Time: 4 minutesComodo publishes strategic analysis of 97 million malware incidents in Q2 Comodo detected and analyzed nearly 100 million incidents in Q2...

A rational take on cryptocurrencies

What they are and what they’re not. Probably.Here at Coin Sciences, we’re best known for MultiChain, a popular platform for creating and deploying...

Cyber-threat Alert: Summer 2017 Phishing Trip to Avoid

Reading Time: 3 minutesA Special Update from the Comodo Threat Intelligence Lab Phishing attacks using emails have become very common but the techniques are...

Comodo One. Comodo Remote Control – Faster and Easier Remote Desktop Connections for MSPs

Reading Time: 5 minutesOne of the priorities of the Comodo One (C1) project is to put an end to the fragmented software model...

MultiChain 1.0 beta 2 and 2.0 roadmap

Where we are today and where we’re going tomorrowToday we’re delighted to release the second beta of MultiChain 1.0 for Linux, Windows and...

Ransomware Defense: How to avoid falling victim to the next “WannaCry” [Webinar]

Reading Time: 2 minutesJoin NATO Cyber Centre Ambassador Kenneth Geers and Comodo cybersecurity expert Gregory Lewis on June 7 for a free webinar...

Your IoT Devices May Be Potential Targets to Malware That Wipe Out Data

Reading Time: 3 minutesCertain malware attacks have been discovered that target IoT (Internet of Things) devices and cause the wiping out of data...

Latest Intelligence

spot_img
spot_img