Zephyrnet Logo

Tag: scanning

Target Data Breach: PCI DSS Auditor in Lawyer’s Crosshairs

Reading Time: 2 minutesRetailers who accept credit cards must periodically demonstrate that they are in compliance the Payment Card Industry Data Security Standards...

Data Security: Protecting Your Most Precious Asset

Reading Time: 3 minutesIn the late 80’s and 90’s, most of the projects I was involved with were about converting paper based systems...

Target Data Breach: PCI Scanning More Important Than Ever

Reading Time: 3 minutes Retailers, like Target,  that accept bank cards are required to adhere to a strict set of standards for protecting the...

Web Inspector: What e-Commerce Should Get for Christmas!

Reading Time: 2 minutesComodo announced last week that our Web Inspector service now also uses the advanced malware detection technologies of their award...

Not So Funny: Cracked Humor Site Serves Drive By Malware

Reading Time: 2 minutesSomething funny was going on at the Cracked Humor web site recently, and many site visitors were not amused.Recently, the...

PCI DATA SECURITY STANDARDS: BEYOND COMPLIANCE

Reading Time: 2 minutesThere is an epidemic of identity theft that is costing businesses and consumers millions of dollars per year. Most of...

Microsoft to Leave Windows XP Users Unprotected

Reading Time: 2 minutesIf you like your operating system you can keep it.But if your OS is Windows XP you might want to...

CryptoLocker Virus – Best Practices to Ensure 100% Immunity

Reading Time: 5 minutesYou may have heard of the latest virus, CryptoLocker, by now. The virus is a form of ransomware, a class...

Avoiding Malware in Android Apps

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app These are exciting times for Android smartphone users, with great...

Hackers Find Fatal Flaw of Fingerprint Security

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app When Apple announced the Touch ID technology that rolled out...

PCI DSS Compliance: Failure is Not an Option

Reading Time: 3 minutesThere is an epidemic of identity theft and financial fraud hat is costing businesses and consumers millions of dollars per...

How to Use CIS Protocol Handlers

Reading Time: 2 minutesDid you know that COMODO Internet Security has its own protocol handlers that allow you to perform certain tasks from...

Latest Intelligence

spot_img
spot_img