Zephyrnet Logo

Tag: virus

Dark Wallet, What’s all the Fuss About?

Reading Time: 5 minutesIn the last few weeks, I have read a fair amount of press coverage about a new Bitcoin wallet application...

Comodo Releases Internet Security 7: The Best Gets Better!

Reading Time: 2 minutesComodo Internet Security (CIS) is a robust suite of computer security systems, including a firewall and multiple layers of defense...

Comodo AV Labs Identifies Dangerous Zeus Banking Trojan Variant

Reading Time: 4 minutesComodo Antivirus Labs has identified a new and extremely dangerous variant of the Zeus banking Trojan. Hackers use Zeus to...

Windows Defender: Minimal Defense, Maximum Risk

Reading Time: 3 minutesIf you are confused about what Antivirus protection is provided by Windows, don’t feel bad. Microsoft has changed its strategy...

Windows XP on ATMs: Should We Be Worried?

Reading Time: 2 minutesMicrosoft is working furiously to convince users of Windows XP to abandon the venerable operating system before they end support...

5 Things to Know When Selecting Security Software

Reading Time: 3 minutesNow more than ever before, computer users need to take measures to protect themselves online, and choosing the right antivirus...

Browser Hijacking: Don’t be a Victim

Reading Time: 2 minutesOne of the most annoying and often dangerous computer compromises is browser hijacking. You probably have experienced it. A program...

Hackers: Why They Do It

Reading Time: 4 minutesNetworks and personal computers are under continuous assault from hackers. The types of attacks vary widely  in complexity and severity,...

Partner Success Story: Tripp Technologies

Reading Time: 4 minutesTripp Technologies, a four-year-old IT and Web design service provider based in Portland, Me., sold its first install of Comodo...

BredoLabs: A Classic Botnet Story

Reading Time: 3 minutesBredoLabs is the name of both a trojan horse program and the largest botnet ever discovered.  The botnet has been...

Stay Away from the Man in the Middle

Reading Time: 3 minutesWhen you were a kid, presuming that you have indeed grown up, did you ever play the game “Man in...

Apple Leaves Snow Leopard in the Cold, Users Vulnerable

Reading Time: 2 minutes Unlike their desktop/laptop rival Microsoft, Apple does not go out of its way to alert their user base that...

Latest Intelligence

spot_img
spot_img