Zephyrnet Logo

Tag: Safari

Webinar video: The Evolution of Payment Cards Tokenization

Our website uses cookies to gather information about how our pages are used. Cookies are small text files stored by the browser (for...

How tokenization is changing the way we pay

Our website uses cookies to gather information about how our pages are used. Cookies are small text files stored by the browser (for...

Is the New Rwandan Cybercrime Law a Step Forward for Cybersecurity in Africa?

Reading Time: 5 minutesLike many countries around the world, cybercrime is a problem in Rwanda. Malware is a frequent means of...

Password Stealer Hides In The Payment File And Hunts For Credentials

Reading Time: 3 minutesCybercriminals’ big hunt for users’ credentials is gaining momentum rapidly. Their strategy usually stays the same: get attention of the...

FREAK Attack Warning: Apple and Google Devices Most Vulnerable

Reading Time: 2 minutesAn SSL/TLS vulnerability has been identified that attackers could use to downgrade the cryptography of HTTPS connections to one vulnerable...

Apple Releases Critical Security Updates

Reading Time: 2 minutesApple has released security updates for OS X, Safari, iOS and Apple TV to address multiple vulnerabilities, one of which...

Apple Safari Security Updates Increasing in Frequency

Reading Time: 1 minuteApple has released a Safari security update to address vulnerabilities which could allow an attacker to execute arbitrary code or...

Apple Releases Critical Security Updates for OS X, Safari and Others

Reading Time: 1 minuteAs scheduled, Apple has released security updates this week for Mac OS X, Safari, iOS devices, and Apple TV to...

Apple Leaves Snow Leopard in the Cold, Users Vulnerable

Reading Time: 2 minutes Unlike their desktop/laptop rival Microsoft, Apple does not go out of its way to alert their user base that...

Curing What Ails the Cat: Apple Fixes for Mountain Lion & Safari

Reading Time: 2 minutesBesides using Comodo Internet Security, the best way to protect your computer is to keep up with all of the...

Anatomy of a Trojan: TrojWare.Win32.TrojanSpy.Volisk.a

Reading Time: 5 minutesAs part of Comodo Labs’ ongoing analysis of “Digital Signature” (confirming software author and guaranteeing computer program code hasn’t been...

February’s gone. But not forgotten.

Reading Time: 2 minutesIf you happen not to have been a frequent reader of the Blog contributions I’ve published within the Social Media...

Latest Intelligence

spot_img
spot_img