Are you the publisher? Claim or contact us about this channel


Embed this content in your HTML

Search

Report adult content:

click to rate:

Account: (login)

More Channels


Showcase


Channel Catalog


Channel Description:

Internet security threat updates and insights.

older | 1 | .... | 20 | 21 | (Page 22) | 23 | 24 | .... | 40 | newer

    0 0

    Vaporizers (AKA E-cigarettes) have been gaining some serious traction and widespread use over the past few years. The sudden surge of popularity isn’t too surprising considering the fact that the health implications of nicotine consumption are vastly more favorable with vaporizers when compared to traditional cigarettes. Most Vaporizers charge through a propriety connection to USB that looks something like this: In a recent reddit post, the poster reported that an executive at a large corporation had a data security breach on his system from malware, the source of which could not be determined initially. The machine was patched up to date, […]

    The post Vaporizer chargers can contain malware appeared first on Webroot Threat Blog.


    0 0

    The threat landscape has been accustomed to rogues for a while now. They’ve been rampant for the past few years and there likely isn’t any end in sight to this scam. These aren’t complex pieces of malware by any means and typically don’t fool the average experienced user, but that’s because they’re aimed at the inexperienced user. We’re going to take a look at some of the improvements seen recently in the latest round of FakeAVs that lead to their success. While the images shown may have different names of A-Secure, Zorton, and AVbytes, they are identical in execution, appearance and are likely from the same author(s). Webroot […]

    The post Social Engineering improvements keep Rogues/FakeAV a viable scam appeared first on Webroot Threat Blog.


    0 0

    Whether it be iPhones with bigger screens, major video game releases to make next-gen systems finally worth it, or wearables that are actually appealing to consumers, it’s safe to say any technological ‘advancement’...read more

    The post Breach Therapy: 10 Companies Who Can’t Wait For 2014 To Be Over appeared first on Webroot Threat Blog.


    0 0

    Several cyber take downs occurred this year when hackers infiltrated Home Depot, Michaels, iCloud, JP Morgan and the list just goes on. And while consumers and companies have been hit hard in 2014,...read more

    The post Why 2015 will be the year of cloud attacks appeared first on Webroot Threat Blog.


    0 0
  • 01/15/15--08:06: Hacking in Hollywood
  • It’s generally understood that Hollywood will always put their own spin on actions in order to help tell a story.  That’s part of the movie and TV magic, or artistic license, that directors...read more

    The post Hacking in Hollywood appeared first on Webroot Threat Blog.


    0 0

    (Yes, he’s Thor in other movies, but that doesn’t mean he can’t hack in Blackhat) Blackhat is out today in theaters, and we were lucky enough to have an advanced screening of the film...read more

    The post Did Blackhat just break the hacker movie stereotype? appeared first on Webroot Threat Blog.


    0 0
  • 02/25/15--13:50: Lenovo Support Page Hacked
  • In possible retaliation to the Superfish MITM software installed on Lenovo consumer machines, hackers looking to be representing Lizard Squad have hacked Lenovo’s support page through DNS hijack.  Currently, if you head to http://support.lenovo.com/us/en/product_security/superfish,...read more

    The post Lenovo Support Page Hacked appeared first on Webroot Threat Blog.


    0 0

    This blog is syndicated from the LabTech Software Blog: http://www.labtechsoftware.com/blog/antivirus-and-anti-malware-tips/ Think your clients are covered? Think again. This year’s epic flu season isn’t relegated to humans alone. The burgeoning threat landscape is better equipped...read more

    The post The Threat Landscape is Expanding. Are You Ready for it? appeared first on Webroot Threat Blog.


    0 0

    Mobile World Congress is the biggest tech show focusing on, wait for it, mobile technology in the world. With many of the big announcements having occurred at the beginning it’s time for us...read more

    The post Mobile World Congress 2015 – The Big Launches appeared first on Webroot Threat Blog.


    0 0

    The encrypting ransomware business model is hugely successful and isn’t going away any time soon (possibly ever). This latest variant not only encrypts the normal scope of valued files, but it now encrypts files required for your...read more

    The post TeslaCrypt – Encrypting ransomware that now grabs your games appeared first on Webroot Threat Blog.


    0 0

    Webroot is excited to be returning as sponsor and briefing presenter of the 2015 RSA Conference in San Francisco, California. From April 20th to the 24th, the Bay Area will host one of...read more

    The post Webroot at RSA Conference 2015 appeared first on Webroot Threat Blog.


    0 0

    New Year, Similar Scams In 2013,  I wrote an article talking about the popular Fake Microsoft Security Scams that were doing the rounds. As expected, these type of scams have continued to grow...read more

    The post Fake Security Scams – 2015 Edition appeared first on Webroot Threat Blog.


    0 0
  • 04/27/15--13:17: A Recap of RSA 2015
  • Last week marked one of the largest security conferences in the world, and with RSA 2015 now to a close, it is time to look back at what we shared, learned, and shown...read more

    The post A Recap of RSA 2015 appeared first on Webroot Threat Blog.


    0 0

    Yesterday, Google announced the release of their newest Chrome extension, Password Alert. The new free tool is designed to warn users of the popular browser when they are entering their Google passwords on...read more

    The post Google’s new Chrome extension is worth downloading appeared first on Webroot Threat Blog.


    0 0
  • 05/04/15--08:37: AlphaCrypt
  • We’ve encountered yet another encrypting ransomware variant and at this point it’s expected since the scam has exploaded in popularity since it’s inception in late 2013. This one has a GUI that is almost...read more

    The post AlphaCrypt appeared first on Webroot Threat Blog.


    0 0
  • 05/06/15--12:04: Rombertik
  • Yesterday in the news we saw a huge spike in the interest of the Rombertik malware. Rombertik infiltrates the computer through email phishing attacks that drop as a .scr screen saver executable that contains the malware that...read more

    The post Rombertik appeared first on Webroot Threat Blog.


    0 0

    In 2013 we shared a series of blog posts about several WhatsApp scams making the rounds redirecting people to pharmaceutical sites and malware. In recent weeks we have seen that these scams have made a...read more

    The post WhatsApp Spam Emails Making a Comeback appeared first on Webroot Threat Blog.


    0 0

    Breaches big and small have been in the news, from small organizations losing banking files to global groups like Sony losing seemingly everything to hackers. But with the recent Office of Personnel Management...read more

    The post The OPM data breach was probably inevitable appeared first on Webroot Threat Blog.


    0 0
  • 07/08/15--04:00: Happy Video Game Day 2015
  • Webroot would like to wish our fellow gamers a happy Video Game Day! To celebrate this epic game playing day, we want to help keep you safe and highlight the top motivation for...read more

    The post Happy Video Game Day 2015 appeared first on Webroot Threat Blog.


    0 0
  • 07/15/15--07:00: A Brief History of Malware
  • Malware has come a long way in 30 years. Back in the 70s, the idea of malicious software was an interesting thought experiment. What if computer programs could take control of a computer?...read more

    The post A Brief History of Malware appeared first on Webroot Threat Blog.


older | 1 | .... | 20 | 21 | (Page 22) | 23 | 24 | .... | 40 | newer