Zephyrnet Logo

Tag: operating system

Windows Systems: 6 Ways to Keep Your Network Secure

Reading Time: 2 minutesMicrosoft Windows is the dominant operating system in business organizations for desktops and intranet servers. It is also the number...

Windows XP Users: Comodo Has Your Back!

Reading Time: 2 minutes April 8th, 2014 is D-Day for Windows XP users everywhere. That’s when Microsoft is going to end support for its venerable...

Yahoo Ad Servers Dish Malvertising

Reading Time: 2 minutes Millions of unsuspecting users were injected with malicious malware content because a number Yahoo’s advertising servers were compromised with malvertising....

Target Data Breach: PCI Scanning More Important Than Ever

Reading Time: 3 minutes Retailers, like Target,  that accept bank cards are required to adhere to a strict set of standards for protecting the...

Block CryptoLocker Before It Installs with Comodo Endpoint Security

CryptoLocker, first spotted in September, continues to claim victims of both consumers and businesses alike. The Trojan is a form of ransomware that...

Adobe Fixes Flash Player and Cold Fusion Vulnerabilities

Reading Time: 2 minutes Adobe has successfully found and patched critical vulnerabilities found in their programs on Windows, Mac and Linux. The popular...

Microsoft to Leave Windows XP Users Unprotected

Reading Time: 2 minutesIf you like your operating system you can keep it.But if your OS is Windows XP you might want to...

Experts Speak Out Against Entering Private Data in Chrome

Reading Time: 2 minutesGoogle recently fixed a series of issues within the Chrome browser. At the same time, despite their strong attempts to...

Comodo Mobile Masters Android Master Key Vulnerability

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app Have you ever heard of the old card trick, the...

Curing What Ails the Cat: Apple Fixes for Mountain Lion & Safari

Reading Time: 2 minutesBesides using Comodo Internet Security, the best way to protect your computer is to keep up with all of the...

Hand of the Thief Trojan: Can it Pick Your Pocket?

Reading Time: 2 minutesCriminals use the latest to technology for a very old-fashioned reason, to steal folk’s money. If they can obtain your...

Windows 8 & Comodo: Perfect Together

Reading Time: 1 minute When considering upgrading to a new operating system your most important question is usually whether the applications you use will...

Latest Intelligence

spot_img
spot_img