Zephyrnet Logo

Tag: hack

The Internet’s Hidden Boundaries

The Internet isn’t the same for everyone. How do we unify it?In 1969, when scientists turned on the first Internet router, it was...

What’s Next for Melih Abdulhayoglu?

Reading Time: 3 minutes Melih took on the giants of the PKI certificate business and bested them, by creating the world’s leading certificate authority. Now...

How To Protect Yourself Against The New WPA2/KRACK WiFi Attack

The world woke up this morning to a new, very damaging security news that impacts every WiFi network and wireless device....

3 Lessons We Can All Learn from The Equifax Hack

Reading Time: 3 minutesFor those of us who have a credit report, there’s a good chance that our sensitive personal information was exposed...

What You Should Do About The Equifax Hack

Equifax was the victim of a major data breach through their website. 143 million records leaked and if that’s one record...

Major cyberattack affects 143 million users. Here’s how you can avoid this happening to your company

Reading Time: 4 minutesIt seems like every week we hear about the biggest ever cyber-attack or hack. Today the news is full of...

The Evolution of SSL and TLS

Reading Time: 3 minutesSSL and TLS are often used interchangeably as they are closely related. Both are online communication protocols and serve the...

Why do Hackers Hack Websites? And How do You Protect Yourself From them?

Reading Time: 3 minutesThere are many reasons behind why hackers target websites. Years ago, hackers did it out sheer vanity. To prove that...

Weed Site Review: LeafedIn.Org

There’s no shortage of new business ventures popping up in the cannabis industry, especially lately with such a promising election coming up, it...

Tackling Cyber Security Threats in 2017

Reading Time: 3 minutesBusinesses are on a helter-skelter as the current waves of cyber attacks make them double their efforts in protecting their...

Learn how Comodo mod_security rules will protect your web servers against attack. Free!

Reading Time: 6 minutes Contents: 1. Introduction2. Preparing the environment3. Attack analysis and prevention4. Conclusion 1) Introduction Web applications are arguably the most important element of today’s...

Latest Wikileaks Document Dump: Comodo is a Pain for Hackers

Reading Time: 2 minutesThe latest news regarding Wikileaks documents from the CIA has caused quite an industry stir, and also caught Comodo’s attention...

Latest Intelligence

spot_img
spot_img