Zephyrnet Logo

Tag: security

Mirai Strikes Back

Reading Time: 4 minutes All it took was one malware to form a botnet that left the domain-based internet inaccessible to many on the...

Women driving Blockchain and Cryptocurrency Innovation in New Zealand

Over the past 4 months, I have engaged my curiosity about blockchain and the implications for life as we know it, in New...

Ryuk Ransomware Authors: “Be thankful you’re hacked by serious people.”

Reading Time: 3 minutes Look out, SamSam. There’s a new ransomware in town that’s very carefully targeting enteprises and businesses. Say hello to Ryuk....

Anti-spam Filtering Techniques

Reading Time: 3 minutesAntispam solutions can be of great use if you or your business is experiencing huge volumes of spam emails. With...

In The Crab’s Claws: The New Version Of Ransomware Hits Everyone But Russians

Reading Time: 5 minutesThe arms race between cybercriminals and cybersecurity warriors is increasing at an enormous speed. Malware authors immediately react on any...

PetLife: Blockchain for Veterinary Medicine

In a time when blockchain is revolutionizing the security and accessibility of healthcare solutions, one company aims to bring those benefits to veterinary...

Litecoin Core v0.16.2 Release

Follow the Google+ page or Twitter for the latest dev news.We are pleased to release Litecoin Core 0.16.2 release. This is a new...

Hong Kong Extends Migrant Policy to Facilitate DLT and FinTech Professionals

A new Hong Kong government initiative seeks to attract professionals in Distributed Ledger Technology (DLT) by simplifying the immigration policy, according to a...

E-Mail Spam Filtering Service For Your Business

Reading Time: 3 minutesThe Best Spam Filtering Service Naturally, website owners and system administrators ponder on many factors that make a spam filter exceptional...

What is Internet Security?

Reading Time: 5 minutesInternet security is a branch of computer security which comprises various security measures exercised for ensuring the security of transactions...

Indian Hospitals Crippled by Ransomware Attacks

Reading Time: 3 minutesRansomware is pretty dreadful when it hits consumer PCs and smartphones. But ransomware is also frequently being used to target...

The Way of Double Deception: Why Unwanted Applications are a Greater Threat than You Realize

Reading Time: 4 minutesMany people don’t take Potentially Unwanted Applications (PUA) as a serious danger. The reason for such a reckless attitude is...

Latest Intelligence

spot_img
spot_img