Zephyrnet Logo

Tag: malware

Mobile Antivirus Adoption Is Low, But Not For Long

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app An alarming report by the Gartner Group claims that consumers...

Comodo Mobile Antivirus Defends Against Malware From Ad Networks

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app Online ad networks are reliable communication mediums that reach a...

Black Hat 2013: An Inside Look into Mobile Security

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app The Black Hat 2013 conference held at Las Vegas a...

Mobile Antivirus and E-Authentication

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app With the surge in mobile phone market and the necessity...

Network Penetration Testing: The Extra Mile

Reading Time: 4 minutesWhen is a bad guy not a bad guy?  When he is your friend pretending to be a bad guy...

PCI DSS Compliance: Failure is Not an Option

Reading Time: 3 minutesThere is an epidemic of identity theft and financial fraud hat is costing businesses and consumers millions of dollars per...

Why is Mobile Security Integral In Modern Era?

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Times have changed and what used to be luxury is...

The Royal Birth: Beware of those Baby Pics!

Reading Time: 2 minutesPeople love baby pictures. Now that the Kate Middleton, aka the Duchess of Cambridge has given birth to a royal...

What’s Worse than Sharknado? Computer Malnado!

Reading Time: 2 minutesEveryone is talking about last week’s Syfi flick Sharknado, the insanely improbable tale of a rain of killer sharks on...

Comodo Technical Report: Android OBAD Trojan Virus

Reading Time: 1 minuteUntil recently, it has been conventional wisdom that the operating systems for mobile devices are much safer than for desktop...

Cyber Crime and the Case for Auto Sandboxing

Reading Time: 2 minutesEvery computer, laptop, tablet and mobile phone connected to your network represents a vulnerable endpoint for viruses, worms, spyware, rootkits,...

Comodo Introduces Industry Changing Endpoint Security Solution

Reading Time: 2 minutesComodo announced today their latest solution for centralized administration of security, including antivirus protection of endpoints. Comodo Endpoint Security Manager...

Latest Intelligence

spot_img
spot_img