Zephyrnet Logo

Tag: users

Going Global: Mikkel Hippe Brun of Tradeshift

In this new series, Going Global, we’re interviewing leaders from companies of all sizes, who all face the same challenge: how do you...

How to Reach Crowdfunding Backers on Twitter – Step By Step Guide

Since the dawn of Kickstarter and Indiegogo, Twitter has been one of the most important tools to find and engage with crowdfunding backers, not...

The Internet’s Hidden Boundaries

The Internet isn’t the same for everyone. How do we unify it?In 1969, when scientists turned on the first Internet router, it was...

Linda Healthcare Infuses A.I. and Blockchain to build Crypto Health Insurance

Over the past few years, more and more people have recognized the power of the blockchain to transform industries. In the over regulated,...

Three (non-pointless) permissioned blockchains in production

Solving real problems in infrastructure, finance and e-commerceIt’s exactly two years since we published “Avoiding the pointless blockchain project“, a checklist of questions...

The uphill battle of beating back weaponized AI

Artificial intelligence isn't just for the law-abiding. Machine learning algorithms are as freely available to... cybercriminals and state-sponsored actors as they are to...

Comodo Q3 2017 Threat Report: Comodo Detects Malware in Every Country on Earth

Reading Time: 3 minutes In Q3 2017, Comodo Threat Research Labs (CTRL) detected nearly 400 million malware incidents from around the world – and...

WordPress Roulette

Reading Time: 3 minutes WordPress, the world’s most popular CMS, requires web admins to perform a massive amount of time and effort to maintain...

Marketing can be a very powerful influence on our ability to accept situations that are sub-optimal

Reading Time: 3 minutes Sometimes a marketing analogy misleads us about the complex idea it is trying to simplify. A great example of this...

Tim O’Reilly: The flawed genie behind algorithmic systems

In his new book WTF? What's the Future and Why It's Up to Us, technology guru and media publisher Tim O'Reilly highlights lessons...

New October Ransomware Attack Hits Endpoints as “Unknown” File Phishes for Victims

Reading Time: 4 minutesComodo Threat Intelligence Lab discovered a new October phishing campaign with the infamous IKARUSdilapidated Locky ransomware payload, marking the 4th...

KRACK Q&A : Protecting Mobile Users Against KRACK Attack

Reading Time: 3 minutes “The October 2017 discovery of KRACK is significant for the security of virtually all smart phone users; the threat is...

Latest Intelligence

spot_img
spot_img