Zephyrnet Logo

Tag: VPN

Comodo Enhances its Mobile Device Management Platform

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app We Bring Superior Mobile Device Management to Your Business Comodo Mobile...

Law Enforcement: You Have Only 2 Weeks to Protect Yourself

Reading Time: 4 minutesOn Monday, the US Department of Justice announced that law enforcement working in multiple countries had successfully seized control...

Homeland Security Reports Hacked Infrastructure with Weak Security

Reading Time: 2 minutesAccording to a new report by the Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), public facing control...

Cyberwar: US to Battle Chinese Military in Court

Reading Time: 2 minutesThe so called cyberwar between the US and China is about to take an interesting turn that could have significant...

Still on XP? Here is Some Advice

Reading Time: 2 minutesWe would never advise using an unsupported operating system. Everytime Microsoft issues a security patch for its supported OSs, it...

Boiler Spring Savings Protects Customers with Comodo

Reading Time: 3 minutesBoiling Springs Savings Bank: Financial Institution introduces SVT technology that authenticates web content to protect critical customer information in online...

Trusted Root Keys: Why they Matter

Reading Time: 2 minutesThe growing use of the Internet for commerce, communication and collaboration has significantly increased the need for online security. Certification...

Advanced Persistent Threats: Everyone is at Risk

Reading Time: 3 minutesYou may think that cyber-attacks are someone else’s problem. You would be wrong. Cyber-attacks are growing in their number, sophistication and...

OPSWAT: Comodo Security is a Leading Networking & Tech Solution

Reading Time: 2 minutes OPSWAT is an independent security firm that provides certifications for security applications to verify that they are compatible with leading...

Comodo AV Labs Warns of Free for Sale Scam

Reading Time: 5 minutesMost of the malware created these days is designed to generate income to the malware authors. That’s not a surprise,...

You’ve Got Spam: AOL Data Breach Tied to Wave of Phishing

Reading Time: 2 minutes The company that made the phrase “You’ve got mail” famous is now saying that if “you’ve got AOL mail” you...

The History of the SSL Certificate

Reading Time: 3 minutesThe Secure Sockets Layer (SSL) Protocol was adopted by Netscape in 1994 as a response to the growing concern over...

Latest Intelligence

spot_img
spot_img