Zephyrnet Logo

Tag: keys

CryptoWall vs Comodo Containment

Reading Time: 1 minuteCryptoWall, the ransomware Trojan, is spread by spam emails, malware already on your computer, or drive-by downloads. Here’s how it works: 1....

POODLE Bites Again: New POODLE Attacks Impact Some TLS

Reading Time: 1 minuteWho let the dog out, again? Earlier this year, it was revealed that hackers could force a downgrade of encrypted connections...

How to Remove Awola Rogue Anti-Spyware

Reading Time: 3 minutesOne of the most popular malware programs used by criminal hackers to defraud computer users is called Awola.  Awola and...

ADVISORY: POODLE Threat Requires Immediate Attention

Reading Time: 3 minutesThis has been a rough year in Internet Security. There has been a deluge of data breaches, especially against Point-of-Sale...

Many Servers Vulnerable to Heartbleed. Act Now!

Reading Time: 3 minutes Various news reports have confirmed that many web servers are still vulnerable to the Heartbleed bug, which effects Apache servers...

Heartbleed Bug: Comodo Urges OpenSSL Users to Apply Patch

Reading Time: 3 minutesIn response to a reported vulnerability in the popular OpenSSL cryptographic library, Comodo is urging its customer, partners and all...

Comodo AV Labs Identifies Dangerous Zeus Banking Trojan Variant

Reading Time: 4 minutesComodo Antivirus Labs has identified a new and extremely dangerous variant of the Zeus banking Trojan. Hackers use Zeus to...

Understanding PGP in Mobile Phone Security

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app PGP stands for Pretty Good Privacy which is a software...

Bitcoins: Hackers Target Virtual Currency

Reading Time: 3 minutesOpinions on Bitcoin, the electronic payment method vary widely. To some, it represents no less than the dawning of a...

Upgrade your SSL certificate to 2048 bits before Dec. 31st – Free

Reading Time: 2 minutesWith the continued evolution of modern day super-computers and processing power, there exists the chance, albeit remote, that hackers could...

SSL 101: How Do I Get a Secured Connection?

Reading Time: 3 minutesThe Secure Sockets Layer (SSL) allows you to communicate over the Internet with a secure and encrypted connection. SSL is...

GitHub Attack: Strong Passwords & 2-Factor Auth Critical

Reading Time: 2 minutesGitHub, the web hosting and code repository firm, is focusing attention on the importance of strong passwords for Internet security....

Latest Intelligence

spot_img
spot_img