Zephyrnet Logo

Tag: vulnerability

Is Your Healthcare Data Safe With the Government?

Reading Time: 2 minutesAs the country begins the full implementation of the Affordable Care Act, which coincides with the government effort to digitize...

Web Inspector: What e-Commerce Should Get for Christmas!

Reading Time: 2 minutesComodo announced last week that our Web Inspector service now also uses the advanced malware detection technologies of their award...

Watch Your Plugins: Silverlight at Risk

Reading Time: 1 minuteAs if we needed it, we have more proof that the black hats never rest. An already notorious exploit kit...

Adobe Fixes Flash Player and Cold Fusion Vulnerabilities

Reading Time: 2 minutes Adobe has successfully found and patched critical vulnerabilities found in their programs on Windows, Mac and Linux. The popular...

New Vulnerabilities Found in D-Link Routers

Reading Time: 1 minuteA router can be a gateway to the wonders of the internet. Unfortunately, it can also be a doorway through...

Microsoft Reports Threat to Older Office Versions and Windows Vista

Reading Time: 1 minuteOn Tuesday, Microsoft warned that hackers are targeting Windows Vista and MS Office versions 2003 to 2010 to exploit a...

Experts Speak Out Against Entering Private Data in Chrome

Reading Time: 2 minutesGoogle recently fixed a series of issues within the Chrome browser. At the same time, despite their strong attempts to...

The Heartland Breach: A Cautionary Tale for E-Commerce

Reading Time: 4 minutesThe notorious John Dillinger was supposedly asked why he robbed banks.  His reply was “That’s where the money is!” You...

Comodo Mobile Masters Android Master Key Vulnerability

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app Have you ever heard of the old card trick, the...

Firefox 24: Mozilla Releases A More Secure Browsing Experience

Reading Time: 2 minutesMozilla Firefox, the most widely known open source web browser, has officially rolled out Firefox 24, the latest update with...

BitCoin Transactions Vulnerable on Android

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app The use of BitCoin, digital currency that is not backed...

Network Penetration Testing: The Extra Mile

Reading Time: 4 minutesWhen is a bad guy not a bad guy?  When he is your friend pretending to be a bad guy...

Latest Intelligence

spot_img
spot_img