Zephyrnet Logo

Tag: stolen

Target Data Breach: Should You Panic?

Reading Time: 2 minutes If you used a credit or debit card at a Target department store between November 27th and December 15th,...

ZeuS Banking Trojan Is Back, Now in 64 Bit

Reading Time: 2 minutesIt’s often said “What’s old is new again”. The well-known ZeuS banking trojan is back again, but this time it...

Is Your Healthcare Data Safe With the Government?

Reading Time: 2 minutesAs the country begins the full implementation of the Affordable Care Act, which coincides with the government effort to digitize...

Adobe Breach Led Anonymous To Spy on FBI

Reading Time: 2 minutes It seems the government is great at collecting data but not very good at protecting it. The FBI recently reported that...

Why are Medical Records Becoming a Target for ID Thieves?

Reading Time: 2 minutesIf you have no idea about medical identity theft, you would probably say that there’s nothing wrong in taking your...

Adobe Data Breach Gets Worse: Time to Change All Your Passwords?

Between Flash and PDF Reader alone, Adobe is ubiquitous on today’s desktop. Have you ever registered for an Adobe product? If you have,...

Experts Speak Out Against Entering Private Data in Chrome

Reading Time: 2 minutesGoogle recently fixed a series of issues within the Chrome browser. At the same time, despite their strong attempts to...

Avoiding Malware in Android Apps

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app These are exciting times for Android smartphone users, with great...

Google, Yahoo and Facebook Ask the NSA for Transparency

With the issues related to NSA a hot topic, the top Internet companies Google, Yahoo and Facebook have now requested permission to publish...

BitCoin Transactions Vulnerable on Android

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app The use of BitCoin, digital currency that is not backed...

Network Penetration Testing: The Extra Mile

Reading Time: 4 minutesWhen is a bad guy not a bad guy?  When he is your friend pretending to be a bad guy...

Why is Mobile Security Integral In Modern Era?

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Times have changed and what used to be luxury is...

Latest Intelligence

spot_img
spot_img