Zephyrnet Logo

Tag: threats

Windows XP Reaches End of the Line, Sort Of

Reading Time: 2 minutesAt long last, Windows XP reaches its end of life deadline today. This is the day. April 8th, that Microsoft...

Comodo Releases Internet Security 7: The Best Gets Better!

Reading Time: 2 minutesComodo Internet Security (CIS) is a robust suite of computer security systems, including a firewall and multiple layers of defense...

Comodo AV Labs Identifies Dangerous Zeus Banking Trojan Variant

Reading Time: 4 minutesComodo Antivirus Labs has identified a new and extremely dangerous variant of the Zeus banking Trojan. Hackers use Zeus to...

Windows Defender: Minimal Defense, Maximum Risk

Reading Time: 3 minutesIf you are confused about what Antivirus protection is provided by Windows, don’t feel bad. Microsoft has changed its strategy...

Target Data Breach: PCI DSS Auditor in Lawyer’s Crosshairs

Reading Time: 2 minutesRetailers who accept credit cards must periodically demonstrate that they are in compliance the Payment Card Industry Data Security Standards...

Comodo ModSecurity Rules & LiteSpeed: Perfect Together

Reading Time: 2 minutesComodo announced today the initial release of its free Comodo ModSecurity Rules for the LiteSpeed Web Server. ModSecurity rules are...

5 Things to Know When Selecting Security Software

Reading Time: 3 minutesNow more than ever before, computer users need to take measures to protect themselves online, and choosing the right antivirus...

Partner Success Story: Tripp Technologies

Reading Time: 4 minutesTripp Technologies, a four-year-old IT and Web design service provider based in Portland, Me., sold its first install of Comodo...

Apple Leaves Snow Leopard in the Cold, Users Vulnerable

Reading Time: 2 minutes Unlike their desktop/laptop rival Microsoft, Apple does not go out of its way to alert their user base that...

How To Remove Win32 Vobfus Xc

Reading Time: 2 minutesDefinition of Win32 Vobfus xc Virus:Win32 Vobfus xc is a risky Trojan Virus which PC users should have removed from...

An Intro to Spyware and Trojans

Reading Time: 2 minutesOnline shopping, online banking and general storage of personal information on personal computers have made consumers more vulnerable to identity...

US-Cert: A Friend Against Cyber Attacks

Reading Time: 3 minutes“I’m from the government and I’m here to help”. You may know that this statement is often listed among...

Latest Intelligence

spot_img
spot_img