Articles on this Page
- 11/21/14--14:48: _Vaporizer chargers ...
- 12/05/14--10:38: _Social Engineering ...
- 12/15/14--13:04: _Breach Therapy: 10 ...
- 01/09/15--12:07: _Why 2015 will be th...
- 01/15/15--08:06: _Hacking in Hollywood
- 01/16/15--12:00: _Did Blackhat just b...
- 02/25/15--13:50: _Lenovo Support Page...
- 03/03/15--12:00: _The Threat Landscap...
- 03/04/15--08:00: _Mobile World Congre...
- 03/12/15--14:26: _TeslaCrypt – Encryp...
- 04/17/15--16:48: _Webroot at RSA Conf...
- 04/27/15--08:55: _Fake Security Scams...
- 04/27/15--13:17: _A Recap of RSA 2015
- 04/30/15--11:20: _Google’s new Chrome...
- 05/04/15--08:37: _AlphaCrypt
- 05/06/15--12:04: _Rombertik
- 06/01/15--12:30: _WhatsApp Spam Email...
- 06/26/15--09:12: _The OPM data breach...
- 07/08/15--04:00: _Happy Video Game Da...
- 07/15/15--07:00: _A Brief History of ...
- 11/21/14--14:48: Vaporizer chargers can contain malware
- 12/05/14--10:38: Social Engineering improvements keep Rogues/FakeAV a viable scam
- 12/15/14--13:04: Breach Therapy: 10 Companies Who Can’t Wait For 2014 To Be Over
- 01/09/15--12:07: Why 2015 will be the year of cloud attacks
- 01/15/15--08:06: Hacking in Hollywood
- 01/16/15--12:00: Did Blackhat just break the hacker movie stereotype?
- 02/25/15--13:50: Lenovo Support Page Hacked
- 03/03/15--12:00: The Threat Landscape is Expanding. Are You Ready for it?
- 03/04/15--08:00: Mobile World Congress 2015 – The Big Launches
- 03/12/15--14:26: TeslaCrypt – Encrypting ransomware that now grabs your games
- 04/17/15--16:48: Webroot at RSA Conference 2015
- 04/27/15--08:55: Fake Security Scams – 2015 Edition
- 04/27/15--13:17: A Recap of RSA 2015
- 04/30/15--11:20: Google’s new Chrome extension is worth downloading
- 05/04/15--08:37: AlphaCrypt
- 05/06/15--12:04: Rombertik
- 06/01/15--12:30: WhatsApp Spam Emails Making a Comeback
- 06/26/15--09:12: The OPM data breach was probably inevitable
- 07/08/15--04:00: Happy Video Game Day 2015
- 07/15/15--07:00: A Brief History of Malware
Vaporizers (AKA E-cigarettes) have been gaining some serious traction and widespread use over the past few years. The sudden surge of popularity isn’t too surprising considering the fact that the health implications of nicotine consumption are vastly more favorable with vaporizers when compared to traditional cigarettes. Most Vaporizers charge through a propriety connection to USB that looks something like this: In a recent reddit post, the poster reported that an executive at a large corporation had a data security breach on his system from malware, the source of which could not be determined initially. The machine was patched up to date, […]
The threat landscape has been accustomed to rogues for a while now. They’ve been rampant for the past few years and there likely isn’t any end in sight to this scam. These aren’t complex pieces of malware by any means and typically don’t fool the average experienced user, but that’s because they’re aimed at the inexperienced user. We’re going to take a look at some of the improvements seen recently in the latest round of FakeAVs that lead to their success. While the images shown may have different names of A-Secure, Zorton, and AVbytes, they are identical in execution, appearance and are likely from the same author(s). Webroot […]
The post Social Engineering improvements keep Rogues/FakeAV a viable scam appeared first on Webroot Threat Blog.
Whether it be iPhones with bigger screens, major video game releases to make next-gen systems finally worth it, or wearables that are actually appealing to consumers, it’s safe to say any technological ‘advancement’...read more
The post Breach Therapy: 10 Companies Who Can’t Wait For 2014 To Be Over appeared first on Webroot Threat Blog.
Several cyber take downs occurred this year when hackers infiltrated Home Depot, Michaels, iCloud, JP Morgan and the list just goes on. And while consumers and companies have been hit hard in 2014,...read more
It’s generally understood that Hollywood will always put their own spin on actions in order to help tell a story. That’s part of the movie and TV magic, or artistic license, that directors...read more
(Yes, he’s Thor in other movies, but that doesn’t mean he can’t hack in Blackhat) Blackhat is out today in theaters, and we were lucky enough to have an advanced screening of the film...read more
The post Did Blackhat just break the hacker movie stereotype? appeared first on Webroot Threat Blog.
In possible retaliation to the Superfish MITM software installed on Lenovo consumer machines, hackers looking to be representing Lizard Squad have hacked Lenovo’s support page through DNS hijack. Currently, if you head to http://support.lenovo.com/us/en/product_security/superfish,...read more
This blog is syndicated from the LabTech Software Blog: http://www.labtechsoftware.com/blog/antivirus-and-anti-malware-tips/ Think your clients are covered? Think again. This year’s epic flu season isn’t relegated to humans alone. The burgeoning threat landscape is better equipped...read more
The post The Threat Landscape is Expanding. Are You Ready for it? appeared first on Webroot Threat Blog.
Mobile World Congress is the biggest tech show focusing on, wait for it, mobile technology in the world. With many of the big announcements having occurred at the beginning it’s time for us...read more
The encrypting ransomware business model is hugely successful and isn’t going away any time soon (possibly ever). This latest variant not only encrypts the normal scope of valued files, but it now encrypts files required for your...read more
The post TeslaCrypt – Encrypting ransomware that now grabs your games appeared first on Webroot Threat Blog.
Webroot is excited to be returning as sponsor and briefing presenter of the 2015 RSA Conference in San Francisco, California. From April 20th to the 24th, the Bay Area will host one of...read more
New Year, Similar Scams In 2013, I wrote an article talking about the popular Fake Microsoft Security Scams that were doing the rounds. As expected, these type of scams have continued to grow...read more
Last week marked one of the largest security conferences in the world, and with RSA 2015 now to a close, it is time to look back at what we shared, learned, and shown...read more
Yesterday, Google announced the release of their newest Chrome extension, Password Alert. The new free tool is designed to warn users of the popular browser when they are entering their Google passwords on...read more
The post Google’s new Chrome extension is worth downloading appeared first on Webroot Threat Blog.
We’ve encountered yet another encrypting ransomware variant and at this point it’s expected since the scam has exploaded in popularity since it’s inception in late 2013. This one has a GUI that is almost...read more
Yesterday in the news we saw a huge spike in the interest of the Rombertik malware. Rombertik infiltrates the computer through email phishing attacks that drop as a .scr screen saver executable that contains the malware that...read more
In 2013 we shared a series of blog posts about several WhatsApp scams making the rounds redirecting people to pharmaceutical sites and malware. In recent weeks we have seen that these scams have made a...read more
Breaches big and small have been in the news, from small organizations losing banking files to global groups like Sony losing seemingly everything to hackers. But with the recent Office of Personnel Management...read more
Webroot would like to wish our fellow gamers a happy Video Game Day! To celebrate this epic game playing day, we want to help keep you safe and highlight the top motivation for...read more