Zephyrnet Logo

Tag: Infections

Wannacry Copycats Expected to Increase BUT There Are Solutions

Reading Time: 3 minutesHere we go again…it should come as no surprise to anyone who follows cybersecurity that another massive cyberattack has occurred,...

How to Stay Protected from WannaCry Ransomware

Reading Time: 3 minutesWhat is WannaCry 2.0 Ransomware? WannaCry malware also referred to as WannaCrypt, WanaCrypt0r 2.0 or Wanna Decryptor, is a virus that...

Project Sauron Malware has been Spying Government PC’s for Five Years

Reading Time: 2 minutesProject Sauron- that’s the name of the sinister malware that has been spying on government computers and computers at major...

Comodo Launches New Cloud Delivered Secure Web Platform

Reading Time: 2 minutesWhen is building walls and boundaries a good thing? When sensitive corporate financial and internal data is at risk, of...

Study: Most Used Antivirus Take up to 6 Months to Catch Threats

Reading Time: 3 minutesThe four most used antivirus have been put to the test and found wanting. We are not surprised. Comodo long ago...

AOL Ad Networks Distributing Malvertising

Reading Time: 2 minutesIt was first reported in early January that AOL ad distribution networks were serving malware infected ads on high profile...

ATMs Vulnerable to Malware Breaches

Reading Time: 3 minutesIt is a commonly held myth that ATM machines are not vulnerable to the type of malware infections that plague...

Educational Institutions Turn to Comodo for Security

Reading Time: 3 minutesComodo, as a matter of company policy, supports education in the United States and provides our security products at reduced...

Hackers Target Silverlight to Deliver Malware

Reading Time: 2 minutesThe case for a containment strategy to defend against malware grew even stronger this week with reports that hackers are...

How To Remove Win32 Vobfus Xc

Reading Time: 2 minutesDefinition of Win32 Vobfus xc Virus:Win32 Vobfus xc is a risky Trojan Virus which PC users should have removed from...

Case Study: Combating Zero Day Threats

Reading Time: 3 minutesJean had a problem, she was managing over 200 endpoints and had no visual way to distinguish what devices were...

PCI DATA SECURITY STANDARDS: BEYOND COMPLIANCE

Reading Time: 2 minutesThere is an epidemic of identity theft that is costing businesses and consumers millions of dollars per year. Most of...

Latest Intelligence

spot_img
spot_img