Are you the publisher? Claim or contact us about this channel


Embed this content in your HTML

Search

Report adult content:

click to rate:

Account: (login)

More Channels


Showcase


Channel Catalog


Channel Description:

Internet security threat updates and insights.

older | 1 | .... | 36 | 37 | (Page 38) | 39 | 40 | newer

    0 0

    Reading Time: ~4 min.Nearly 50 percent of Americans don’t use antivirus software That’s right; something as basic as installing internet security software (which we all know we’re supposed to use) is completely ignored by about half the US. You’d be amazed how common this and other risky online behaviors are. We did a survey of people’s internet habits […]

    The post American Cybercrime: The Riskiest States in 2018 appeared first on Webroot Blog.


    0 0

    Reading Time: ~3 min.GDPR represents a massive paradigm shift for global businesses. Every organization that handles data belonging to European residents must now follow strict security guidelines and businesses are now subject to hefty fines if data breaches are not disclosed. Organizations around the world have been busy preparing to comply with these new regulations, but many internet […]

    The post Is GDPR a Win for Cybercriminals? appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for all things security. Any questions? Just ask. 92 Million Genealogy Site Accounts Compromised Earlier this week, genealogy and DNA testing site MyHeritage revealed it […]

    The post Cyber News Rundown: MyHeritage Breached appeared first on Webroot Blog.


    0 0

    Reading Time: ~3 min.Cyberattacks are on the rise, with UK firms being hit, on average, by over 230,000 attacksin 2017. Managed service providers (MSPs) need to make security a priority in 2018, or they will risk souring their relationships with clients. By following 3 simple MSP best practices consisting of user education, backup and recovery, and patch management, […]

    The post 3 MSP Best Practices for Protecting Users appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.Apple Bans All Cryptocurrency Mining Apps from App Store Apple has made several policy changes over the last few days that will effectively ban all cryptocurrency mining features from apps in the App Store. This change comes not long after Apple removed an app called Calender 2, which silently began background mining for Monero but […]

    The post Cyber News Rundown: Apple Bans Crypto Mining Apps appeared first on Webroot Blog.


    0 0

    Reading Time: ~4 min.I had the privilege of giving a keynote on one of my favorite topics, busting myths around artificial intelligence (AI) and machine learning (ML), during DattoCon 2018 this week. Webroot has been doing machine learning for more than a decade and consider this aspect one of our key differentiators for our solutions. However, for many […]

    The post Parsing the Distinction Between AI & Machine Learning appeared first on Webroot Blog.


    0 0

    Reading Time: ~4 min.We’ve seen some tricky techniques used by cybercriminals to distribute malware through social media. One common threat begins with a previously compromised Facebook account sending deceptive messages that contain SVG image attachments via Facebook Messenger. (The SVG extention is an XML-based vector image format for two-dimensional graphics with support for interactivity and animation.) Cybercriminals prefer […]

    The post Social Media Malware is Deviant, Destructive appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.Weaponized USB Drives Targeting Japan and South Korea In an effort to target air-gapped internal systems, a new wave of weaponized USB drives has been found throughout Japanese and South Korean organizations. While these attacks are relatively uncommon, that only heightens the threat as most companies are ill-prepared for such an attack and have created […]

    The post Cyber News Rundown: Weaponized USB Drives appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.Canadian college breach targets thousands Last Friday, Algonquin College officials announced that an earlier data breachpotentially affected thousands of current and former students, as well as employees. While it is still unclear exactly what systems were affected, the officials have been working to contact all potential victims and inform them of the situation. What’s more […]

    The post Cyber News Rundown: Adidas US customers’ personal information stolen appeared first on Webroot Blog.


    0 0

    Reading Time: ~3 min.With cybercrime damages set to cost the world $6 trillion annually by 2021, a new bar has been set for cybersecurity teams across industries to defend their assets. This rings especially true for IT service providers, who are entrusted to keep their clients’ systems and IT environments safe from cybercriminals. These clients are typically small […]

    The post 3 Cyber Threats IT Providers Should Protect Against appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.Ticketmaster Snafu Only Tip of the Iceberg After last month’s Ticketmaster breach, a follow-up investigation found it to be part of a larger payment card compromising campaign affecting more than 800 online retail sites worldwide. The cause of the breach appears to stem from the third-party breaches of several Ticketmaster suppliers, which allowed hackers to […]

    The post Cyber News Rundown: Ticketmaster Hack Reveals Mega Breach appeared first on Webroot Blog.


    0 0

    Reading Time: ~3 min.While one-click shopping on Amazon (or Webroot.com, for that matter) seems super easy when you’re the consumer, there are a lot of complex strategies and processes going on behind the scenes. We chat with Cathy Ondrak, product owner for Webroot.com, to get a glimpse behind the curtain. In her role, Cathy works with developers, business […]

    The post Get to know Cathy Ondrak, Product Owner appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.Venmo’s Public Data Setting Shows All Researchers recently uncovered just how much data is available through the Venmo API, successfully tracking routines, high-volume transactions from vendors, and even monitoring relationships. Because Venmo’s privacy settings are set to public by default, many users have unknowingly contributed to the immense collection of user data available for all […]

    The post Cyber News Rundown: Venmo Setting Airs Dirty Laundry appeared first on Webroot Blog.


    0 0

    Reading Time: ~4 min.According to the Identity Theft Research Center, 2017 saw 1,579 data breaches—a record high, and an almost 45 percent increase from the previous year. Like many IT service providers, you’re probably getting desensitized to statistics like this. But you still have to face facts: organizations will experience a security incident sooner or later. What’s important […]

    The post 6 Steps to Build an Incident Response Plan appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.Paired Bluetooth Devices Vulnerable to Man-in-the-Middle Attacks A new vulnerability has been discovered that would allow an attacker to easily view the traffic sent between two Bluetooth-paired devices. The core of the vulnerability relies on the attacker’s device being within wireless range of both devices in the process of being paired. Signals from each device […]

    The post Cyber News Rundown: Bluetooth Man-in-the-Middle appeared first on Webroot Blog.


    0 0

    Reading Time: ~6 min.Cybercriminals are constantly experimenting with new ways to take money from their victims. Their tactics evolve quickly to maximize returns and minimize risk. The emergence of cryptocurrency has opened up new opportunities to do just that. To better understand today’s threat landscape, it’s worth exploring the origins of cryptocurrencies and the progress cybercriminals have made […]

    The post Crime and Crypto: An Evolution in Cyber Threats appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.Cryptojacking “Game” Found on Steam Store Valve has taken recent action against an indie-developed game available on Steam, the company’s game/app store, and removed their listing after many customers had complained about cryptomining slowing their systems, once launched. Additionally, the developers have been caught selling in-game items on third-party sites, that were falsely portrayed as […]

    The post Cyber News Rundown: Valve Bans Developer for Cryptojacking appeared first on Webroot Blog.


    0 0

    Reading Time: ~4 min.This week, I’ll be at Black Hat USA 2018 in Las Vegas. If you’ve ever been to Black Hat, then you know all about the flood of information and how hard it can be to take it all in. This year’s presentations will range from the newest trends in browser exploits, bots, and social engineering […]

    The post Between Two Worlds: An Interview with Reverse Engineer Eric Klonowski appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.Chipmaker Production Halts After WannaCry Attack A recent WannaCry attack at a Taiwanese chip manufacturerhas brought production to a standstill and threatens delays for new Apple products yet to be released. The manufacturer has announced that after two days their systems are clear and production is able to continue, blaming their own negligence for the […]

    The post Cyber News Rundown: WannaCry Shuts Down Taiwanese Chipmaker appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.Instagram Hack Baffles Users Hundreds of Instagram users have found themselves locked out of their accounts over the past week, with all methods of retrieving them having been removed as well. The episode began with many users noticing their accounts had been logged out and contact information changed, including email addresses with a .ru domain. […]

    The post Cyber News Rundown: Instagram Hack Baffles Users appeared first on Webroot Blog.


older | 1 | .... | 36 | 37 | (Page 38) | 39 | 40 | newer