Zephyrnet Logo

Tag: protect

AVG Toolbar Makes Internet Explorer Users Vulnerable to Attack

Reading Time: 1 minuteAccording to a report from Homeland Security, the AVG Secure Search toolbar includes an ActiveX control that provides several unsafe...

Homeland Security: Symantec Web Gateway Vulnerable

Reading Time: 1 minuteAccording to Homeland Security’s Computer Emergency Response Team (US-CERT), the Symantec Web Gateway contains SQL injection and cross-site scripting vulnerabilities. Symantec...

WordPress Joins the Club, Secures Domains with SSL

Reading Time: 1 minuteWordPress announced recently that they would join the club of web applications that use SSL by default for all of...

Cisco: Popular Sites Spreading Ransomware via Mavlertising

Reading Time: 2 minutesRansomware is quickly becoming the scourge of the Internet and Cisco Systems is reporting that several very popular web sites...

Law Enforcement: You Have Only 2 Weeks to Protect Yourself

Reading Time: 4 minutes On Monday, the US Department of Justice announced that law enforcement working in multiple countries had successfully seized control of...

Comodo Releases Internet Security 7: The Best Gets Better!

Reading Time: 2 minutesComodo Internet Security (CIS) is a robust suite of computer security systems, including a firewall and multiple layers of defense...

Comodo AV Labs Identifies Dangerous Zeus Banking Trojan Variant

Reading Time: 4 minutesComodo Antivirus Labs has identified a new and extremely dangerous variant of the Zeus banking Trojan. Hackers use Zeus to...

Comodo Mobile Security for Android: Competitor Comparisons

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Mobile Devices, such as smartphones and tablets, are the hottest...

Comodo ModSecurity Rules & LiteSpeed: Perfect Together

Reading Time: 2 minutesComodo announced today the initial release of its free Comodo ModSecurity Rules for the LiteSpeed Web Server. ModSecurity rules are...

5 Things to Know When Selecting Security Software

Reading Time: 3 minutesNow more than ever before, computer users need to take measures to protect themselves online, and choosing the right antivirus...

Hackers: Why They Do It

Reading Time: 4 minutesNetworks and personal computers are under continuous assault from hackers. The types of attacks vary widely  in complexity and severity,...

Astonishing Leniencies Regarding Data Security

Reading Time: 2 minutesThe first protection that your data has is password against online data thieves as well as against the people that...

Latest Intelligence

spot_img
spot_img