Zephyrnet Logo

Tag: scan

Comodo Mobile Masters Android Master Key Vulnerability

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app Have you ever heard of the old card trick, the...

Mobile Antivirus Prevention Top Tips

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app There are tons of security tips provided online for the...

PCI DSS Compliance: Failure is Not an Option

Reading Time: 3 minutesThere is an epidemic of identity theft and financial fraud hat is costing businesses and consumers millions of dollars per...

Why is Mobile Security Integral In Modern Era?

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Times have changed and what used to be luxury is...

How to Use CIS Protocol Handlers

Reading Time: 2 minutesDid you know that COMODO Internet Security has its own protocol handlers that allow you to perform certain tasks from...

Anatomy of a Trojan: TrojWare.Win32.TrojanSpy.Volisk.a

Reading Time: 5 minutesAs part of Comodo Labs’ ongoing analysis of “Digital Signature” (confirming software author and guaranteeing computer program code hasn’t been...

How to Prevent Website Caution Alerts & Site Blacklisting

Reading Time: 3 minutesGriffin, the Victorian-era character H. G. Wells gifted with invisibility, proclaimed himself to be the inventor of the greatest scientific...

Comodo SiteInspector: Free Malware Scan & Blacklist Monitor

Reading Time: 2 minutesAnother day, another innovative product from the security experts from Comodo. This time, it is free tool for protecting web...

March is gone. But not forgotten.

Reading Time: 1 minuteIf you happen not to have been a frequent reader of the Blog contributions I’ve published within the Social Media...

Windows Antivirus: Comodo announces the ultimate, help-not-hype

Reading Time: 3 minutesBy the end of today, it will have happened again. Just like it did yesterday. And will again tomorrow. From the...

The 21st Century’s most devastating threat to worker productivity

Reading Time: 3 minutesBuilding the pyramids. Assembling Model T Fords. Manufacturing all the American Military hardware it took to win WWII. Three historic...

Comodo Dragon: Outshines Chrome with AntiVirus Scan

Reading Time: 4 minutesAccording to Forrester, the world’s preeminent source of statistical data on the Internet, American adults now spend an average of...

Latest Intelligence

spot_img
spot_img