Zephyrnet Logo

Tag: hackers

Are You Protected From Your Frenemies?

Reading Time: 4 minutesWe have the software to do a pretty good job of protecting ourselves from our digital enemies, the hackers who...

GitHub Attack: Strong Passwords & 2-Factor Auth Critical

Reading Time: 2 minutesGitHub, the web hosting and code repository firm, is focusing attention on the importance of strong passwords for Internet security....

Multi Factor Authentication – What It Is All About

By Benson HedgeWhen we talk of internet transactions, we have always been protecting them with passwords. But do you think passwords are a...

Adobe Fixes Flash Player and Cold Fusion Vulnerabilities

Reading Time: 2 minutes Adobe has successfully found and patched critical vulnerabilities found in their programs on Windows, Mac and Linux. The popular...

New Vulnerabilities Found in D-Link Routers

Reading Time: 1 minuteA router can be a gateway to the wonders of the internet. Unfortunately, it can also be a doorway through...

Microsoft Reports Threat to Older Office Versions and Windows Vista

Reading Time: 1 minuteOn Tuesday, Microsoft warned that hackers are targeting Windows Vista and MS Office versions 2003 to 2010 to exploit a...

Microsoft to Leave Windows XP Users Unprotected

Reading Time: 2 minutesIf you like your operating system you can keep it.But if your OS is Windows XP you might want to...

Adobe Data Breach Gets Worse: Time to Change All Your Passwords?

Between Flash and PDF Reader alone, Adobe is ubiquitous on today’s desktop. Have you ever registered for an Adobe product? If you have,...

Data Encryption Needs to Be Part of Everyday Life

Reading Time: 2 minutesEmploying encryption strategies needs to be an everyday part of life due to the widespread use of mobile computing and...

Are Multi-Domain SSL Certificates Right for You?

Reading Time: 1 minuteNo web site that exchanges personal data with its site visitors can afford to operate without SSL. Without it, internet...

The Next Step in User Authentication: Pills and Tattoos?

Reading Time: 2 minutesHow does a system know you are really you?How to answer that question is becoming an increasingly urgent problem. Hacking is...

The Heartland Breach: A Cautionary Tale for E-Commerce

Reading Time: 4 minutesThe notorious John Dillinger was supposedly asked why he robbed banks.  His reply was “That’s where the money is!” You...

Latest Intelligence

spot_img
spot_img