Zephyrnet Logo

Tag: spyware

How to Remove the Dreaded Vosteran Browser Hi-Jacker

Reading Time: 2 minutesWhen is a computer virus not a computer virus? When it is Vosteran.It may enter your computer unnoticed and change...

Firewall Fundamentals

Reading Time: 2 minutesAt their most basic, firewalls work like a filter between your computer/network and the Internet. You can program what you...

Comodo Antivirus Conquers “Weapons Grade” Surveillance

Reading Time: 2 minutesWe are happy to report more independent evidence that you can sleep tight at night with Comodo Antivirus, even from...

Senate Report Exposes Dangers of Online Advertising and Malvertising

Reading Time: 2 minutesImproving privacy and security while browsing has been a major objective for Comodo in recent product releases and enhancements, and...

Comodo Releases Internet Security 7: The Best Gets Better!

Reading Time: 2 minutesComodo Internet Security (CIS) is a robust suite of computer security systems, including a firewall and multiple layers of defense...

5 Things to Know When Selecting Security Software

Reading Time: 3 minutesNow more than ever before, computer users need to take measures to protect themselves online, and choosing the right antivirus...

Browser Hijacking: Don’t be a Victim

Reading Time: 2 minutesOne of the most annoying and often dangerous computer compromises is browser hijacking. You probably have experienced it. A program...

Partner Success Story: Tripp Technologies

Reading Time: 4 minutesTripp Technologies, a four-year-old IT and Web design service provider based in Portland, Me., sold its first install of Comodo...

An Intro to Spyware and Trojans

Reading Time: 2 minutesOnline shopping, online banking and general storage of personal information on personal computers have made consumers more vulnerable to identity...

Comodo Dragon is Armed Against Malvertising

Reading Time: 2 minutes Malvertising The first time I saw the term I thought it was a typo. In fact, it is a term that...

5 Tips to Choose the Right Internet Security Software

Reading Time: 3 minutesProtecting yourself online is a never ending battle. In fact, sometimes I wish I did not know so much about...

The Heartland Breach: A Cautionary Tale for E-Commerce

Reading Time: 4 minutesThe notorious John Dillinger was supposedly asked why he robbed banks.  His reply was “That’s where the money is!” You...

Latest Intelligence

spot_img
spot_img