Zephyrnet Logo

Tag: Vulnerable

What’s Next for Melih Abdulhayoglu?

Reading Time: 3 minutes Melih took on the giants of the PKI certificate business and bested them, by creating the world’s leading certificate authority. Now...

KRACK Q&A : Protecting Mobile Users Against KRACK Attack

Reading Time: 3 minutes “The October 2017 discovery of KRACK is significant for the security of virtually all smart phone users; the threat is...

A Basic Guide to Buying Patch Management Software

Reading Time: 2 minutesYou have decided to purchase a Patch Management Software – that’s a good decision. Now, you must be wondering what...

Patch Management Being Ignored

Reading Time: 2 minutesMany enterprises are not giving due importance to patch management. Is this because they do not fully understand the importance...

The Right Way to do Patch Management

Reading Time: 3 minutesIt has been established without a doubt that patch management is very important. Now the question is, how to do...

Dr Mark Goldspink of the ai Corporation (ai)

This week on FinTech Profile, we talk to Dr Mark Goldspink, CEO of The ai Corporation (ai) Founded in 1998, ai has a long...

5 Points to Consider When Evaluating Next-Generation Endpoint Security Products

Reading Time: 3 minutesEndpoints are extremely vulnerable to security breaches. Hackers find endpoints to channel out infectious attacks through advanced persistent threats and...

Comodo Q1 2017 Threat Report: Russia is World’s No. 1 Malware Target

Reading Time: 2 minutes Comodo Threat Research Labs (CTRL) detected more than 25 million malware incidents in 223 top-level country code domains (ccTLD), in...

Petya Ransomware | How It Spreads and How to Stay Ahead

After an examination of the encryption routine of the malware utilized as a part of the Petya/ExPetr assaults, experts understand that the malware...

Wannacry Copycats Expected to Increase BUT There Are Solutions

Reading Time: 3 minutesHere we go again…it should come as no surprise to anyone who follows cybersecurity that another massive cyberattack has occurred,...

Is Your Company’s Data Being Sold on the Dark Web?

Reading Time: 3 minutesLearn how Comodo can help you for free if any of your information is already for sale on the Dark...

Learn how Comodo mod_security rules will protect your web servers against attack. Free!

Reading Time: 6 minutes Contents: 1. Introduction2. Preparing the environment3. Attack analysis and prevention4. Conclusion 1) Introduction Web applications are arguably the most important element of today’s...

Latest Intelligence

spot_img
spot_img