Are you the publisher? Claim or contact us about this channel


Embed this content in your HTML

Search

Report adult content:

click to rate:

Account: (login)

More Channels


Showcase


Channel Catalog


Channel Description:

Internet security threat updates and insights.

older | 1 | .... | 30 | 31 | (Page 32) | 33 | 34 | .... | 40 | newer

    0 0

    Computer safety has never been more of a necessity, regardless of your location in the world. This week’s cyber news recap spans from Western Europe to Australia, with a variety of threats that everyday...read more

    The post Cyber News Rundown: Edition 11/4/2016 appeared first on Webroot Threat Blog.


    0 0

    Your online identity is at risk now more than ever. This week’s cyber news update covers the growing threat of online banking attacks and phishing scams across the globe. Tesco Bank Hacked For Millions...read more

    The post Cyber News Rundown: Edition 11/11/2016 appeared first on Webroot Threat Blog.


    0 0

    Alarming Number of Sites Still Using SHA-1 Certificates The January deadline for switching over to SHA-2 rapidly approaching. For the vendors that are still lagging behind, they will begin to see browser warnings...read more

    The post Cyber News Rundown: Edition 11/18/16 appeared first on Webroot Threat Blog.


    0 0

      For many years now, Microsoft has offered a system with Windows that allows you to take control of another machine. This has been invaluable for system admins that need to control servers...read more

    The post RDP Attacks: What You Need to Know and How to Protect Yourself appeared first on Webroot Threat Blog.


    0 0
  • 11/30/16--15:53: Top 10 Most Infected States
  •   The sheer number of cyberattacks lately led us to this question: which states are at the greatest risk of a cyberattack? Naturally, we took it a step further. We looked into data...read more

    The post Top 10 Most Infected States appeared first on Webroot Threat Blog.


    0 0

      Between a handful of high profile network hacks and the steady stream of ransomware attacks, the last week of November didn’t pull any punches in the constant sparring match that is cybersecurity....read more

    The post Cyber News Rundown: Edition 12/2/16 appeared first on Webroot Threat Blog.


    0 0

      Corny title aside, ‘tis officially the season for online shopping, and that means a drastic increase in phishing scams. In order to obtain sensitive information from specific organizations and people, these threats...read more

    The post All Phishing Scams Want for Christmas… appeared first on Webroot Threat Blog.


    0 0

      Personal computers and devices aren’t the only targets for ransomware authors. Their methods have evolved to target government offices and profitable organizations, forcing them to rethink their cybersecurity mitigation plans.   Blackheart...read more

    The post Cyber News Rundown: Edition 12/9/16 appeared first on Webroot Threat Blog.


    0 0

      Managed service providers are tasked with serving a broad range of markets, from construction to healthcare; accounting to legal; staffing firms to manufacturing; media and advertising to technology. But the day-to-day MSP...read more

    The post Maximizing MSP Profits with Cybersecurity Partnerships appeared first on Webroot Threat Blog.


    0 0

      Credit card fraud and email scams aren’t the only thing you have to worry about this holiday season. Criminals in the UK are stepping up their game by using radio frequencies to...read more

    The post Cyber News Rundown: Edition 12/16/16 appeared first on Webroot Threat Blog.


    0 0
  • 12/16/16--14:38: History of Holiday Tech Toys
  •   Who remembers the Atari 2600? Yeah, I don’t either. Just kidding. Maybe. It’s hard to think about the words tech and toys together before the 1990s. However, they were a thing. Kids...read more

    The post History of Holiday Tech Toys appeared first on Webroot Threat Blog.


    0 0

      Did we get you to click? That’s how the bad guys get you, too. One little click on the wrong link and your clients’ businesses could be up the proverbial creek. Theft...read more

    The post MSPs Won’t Believe What Ransomware is up to Now… appeared first on Webroot Threat Blog.


    0 0

      As 2016 comes to a close, it’s time to reflect back on the largest/most significant security news stories that left an impact on the world. Mirai Botnet Being hailed as the largest...read more

    The post Cyber News Rundown: Edition 12/23/16 appeared first on Webroot Threat Blog.


    0 0
  • 12/29/16--14:57: What to Expect at CES 2017
  • Why wait for news on the next big thing in technology, when you can get a sneak peek at the hottest, up-and-coming consumer tech and innovations at CES 2017? For the last 50...read more

    The post What to Expect at CES 2017 appeared first on Webroot Threat Blog.


    0 0

      Ransomware “Star” Shines on LG Smart TV As ransomware continues to steal the malware stage, its authors have widened their target audience to include smart devices, such as TVs. Since a number...read more

    The post Cyber News Rundown: Edition 12/30/16 appeared first on Webroot Threat Blog.


    0 0

    If you’re anything like me, you probably make a bunch of lofty resolutions every year that you probably won’t, or even can’t, achieve. (For instance, I’ve been promising to hit the gym a...read more

    The post 5 Totally Achievable Resolutions appeared first on Webroot Threat Blog.


    0 0

      By now, everybody has probably heard of CryptoLocker. It makes sense that CryptoLocker would get a fair amount of media attention, since it’s been involved in several high-profile hacks, but there are...read more

    The post Four Rising Stars on the Ransomware Stage appeared first on Webroot Threat Blog.


    0 0

      FireCrypt Ransomware Builder Found in Wild Researchers have discovered a new ransomware variant that uses “.firecrypt” as its amended extension once encryption has taken place. FireCrypt is compiled using a command line...read more

    The post Cyber News Rundown: Edition 1/6/17 appeared first on Webroot Threat Blog.


    0 0

      Personal computers and devices aren’t the only targets for ransomware authors. Their methods have evolved to target government offices and profitable organizations, forcing them to rethink their cybersecurity mitigation plans.   Blackheart...read more

    The post Cyber News Rundown: Edition 12/9/16 appeared first on Webroot Threat Blog.


    0 0

    “Highest average score for ease of use, quality of support, and […] requirements in endpoint protection.” That’s how Marty Duffy, Director of Research at G2 Crowd, describes Webroot after seeing the results of...read more

    The post Webroot named among the Best Software Products for IT Teams 2017 appeared first on Webroot Threat Blog.


older | 1 | .... | 30 | 31 | (Page 32) | 33 | 34 | .... | 40 | newer