Zephyrnet Logo

Tag: Trojan

Comodo Detects New Family of Sophisticated Financial Malware

Reading Time: 3 minutesComodo Threat Research Labs (CTRL) has announced that it has detected a new family of financial malware dubbed as “Gugi/Fanta/Lime”....

FROM THE COMODO LABS: Comodo Containment vs. Zeus/MitB

Reading Time: 4 minutesThe security engineers and IT experts from the Comodo Threat Research Labs are constantly analyzing the thousands of malware families...

FROM THE COMODO LABS: What’s old is new again, as that e-fax could contain CryptoLocker

Reading Time: 5 minutesSince 2013, the CryptoLocker malware has been making its way across the Internet in various forms, in various iterations. CryptoLocker...

FROM THE COMODO LABS: New Malware Attack Targets UK Mail Customers

Reading Time: 3 minutesThe Comodo Antispam Labs (CASL) team has identified a malware attack targeted specifically at businesses and consumers who may use...

CryptoWall vs Comodo Containment

Reading Time: 1 minuteCryptoWall, the ransomware Trojan, is spread by spam emails, malware already on your computer, or drive-by downloads. Here’s how it works: 1....

From The Comodo Think Tank: Cryptolocker, SpyEye and Shylock Malware are No Match for Comodo Containment Technology

Reading Time: 3 minutesOver the past few weeks, the engineers from the Comodo Think Tank have looked at some of the most feared...

Cryptolocker vs Comodo’s Containment

Reading Time: 1 minuteCryptolocker, the ransomware Trojan, works like this: 1. Reads a file2. Encrypts that file3. Overwrites original file with encrypted file4. Demands...

Want $3 Million? Find Botnet Admin Evgeniy Bogachev

Reading Time: 2 minutesIt is a sign of the times that a cyber criminal makes the FBI’s top 10 most wanted list. And...

“Free Porn” Costly to 100,000 Facebook Users

Reading Time: 1 minuteHackers know some people just can’t resist the allure of free porn, as 100,000 Facebook users learned the hard way....

What is a Personal Firewall?

Reading Time: 2 minutesA Personal Firewall controls network communication in and out of a single user’s computer and will restrict the communication based...

Firewall Fundamentals

Reading Time: 2 minutesAt their most basic, firewalls work like a filter between your computer/network and the Internet. You can program what you...

Comodo AV Labs Identifies Phishing Scam Targeting Gamers

Reading Time: 6 minutesContributors: Ionel Pomana, Kevin Judge Video games have played an important role in the history of computers and are a...

Latest Intelligence

spot_img
spot_img