Are you the publisher? Claim or contact us about this channel


Embed this content in your HTML

Search

Report adult content:

click to rate:

Account: (login)

More Channels


Showcase


Channel Catalog


Channel Description:

Internet security threat updates and insights.

older | 1 | .... | 37 | 38 | (Page 39) | 40 | newer

    0 0

    Reading Time: ~2 min.Dark Tequila Targets Mexican Financial Organizations Over the past 5 years, one malware campaign has been plaguing the financial industries of Mexico: Dark Tequila. While many researchers have been monitoring samples for most of that time, only recently has the entire campaign come into focus, with over 30,000 unique targets in 2018 alone. Using mostly […]

    The post Cyber News Rundown: Dark Tequila Malware appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.Texas Voters’ Data Leaked A security researcher just discovered a publicly-available file containing sensitive voting informationfor nearly 99% of all registered voters in the state of Texas. The file was compiled by a data firm that was trying to gauge political opinion for the 2016 elections, as well as more localized campaigns. With all the […]

    The post Cyber News Rundown: Texas Voter Data Leaked appeared first on Webroot Blog.


    0 0

    Reading Time: ~4 min.If you saw a file called eicar.com on your computer, you might think it was malware. But, you would be wrong. Readers, if you haven’t yet met the EICAR test file, allow me to introduce you to it. If you have used the EICAR test file, let’s get a bit cozier with it. If you […]

    The post EICAR – The Most Common False Positive in the World appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.Banking Trojans Still Appearing in Google Play Store Multiple security researchers recently discovered a handful of banking trojans that have still managed to make their way into the Google Play app store, despite Google having increased its security to detect such apps. Many of the apps are disguised as astrology/horoscope software, but instead of reading […]

    The post Cyber News Rundown: Banking Trojans in Google Play appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.Massive Customer Database Left Exposed by Data Management Firm A security researcher recently found a database containing customer information for nearly half a billion users of Veeam software on an unsecured AWS server. Most of the data was contact information spanning from 2013 to 2017 and was likely used by the Veeam marketing team’s automated […]

    The post Cyber News Rundown: Big Data Mismanagement appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.Newegg Breach Lasts Nearly a Month Newegg finally addressed a recent breach after unknowingly hosting malicious code within a payment page for the last month. While the company is still unclear about how many customers were affected, the injected code does appear to have targeted both desktop and mobile visitors to the Newegg site. This […]

    The post Cyber News Rundown: Newegg Breached appeared first on Webroot Blog.


    0 0

    Reading Time: ~3 min.While ransomware, last year’s dominant threat, has taken a backseat to cryptomining attacks in 2018, it has by no means disappeared. Instead, ransomware has become a more targeted business model for cybercriminals, with unsecured remote desktop protocol (RDP) connections becoming the favorite port of entry for ransomware campaigns. RDP connections first gained popularity as attack […]

    The post Unsecure RDP Connections are a Widespread Security Failure appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.Firefox Vulnerability Leads to Crash A new denial-of-service (DoS) attack has been created with the ability to cause desktop versions of the browser Firefox to freeze or crash. Upon visiting sites where the malicious script is present, the user’s browser forces download requests for a massive junk file that can cause the IPC channel for […]

    The post Cyber News Rundown: Firefox Vulnerable to DoS Attack appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.Brazilian Bank Traffic Rerouted by Massive Botnet A botnet containing more than 100,000 routers and other devices was recently spotted hijacking traffic destined for several Brazilian banks. The hijacking victims are then sent to one of at least 50 confirmed phishing sites that will attempt to steal any information the user will provide. Backing this […]

    The post Cyber News Rundown: Botnet Targets Brazil’s Banks appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.Latest Windows 10 Update Removes User Files Microsoft recently pulled its latest update, version 1809, after several users complained about personal files being deleted. While some users were able to use third-party software to retrieve deleted files, users whose files wnet missing from the Documents folder are having a much trickier time without restoring from […]

    The post Cyber News Rundown: Windows 10 Update Deletes Files appeared first on Webroot Blog.


    0 0

    Reading Time: ~3 min.For the past 20 years, Webroot’s technology has been driven by our dedication to protecting users from malware, viruses, and other online threats. The release of Webroot® WiFi Security—a new virtual private network (VPN) app for phones, computers, and tablets—is the next step in fulfilling our commitment to protect everyone’s right to be secure in […]

    The post Webroot WiFi Security: Expanding Our Commitment to Security & Privacy appeared first on Webroot Blog.


    0 0

    Reading Time: ~3 min.There’s a reason major industry players have been discussing cybersecurity more and more: the stakes are at an all-time high for virtually every business today. Cybersecurity is not a matter businesses can afford to push off or misunderstand—especially small and medium-sized businesses (SMBs), which have emerged as prime targets for cyberattacks. The risk level for […]

    The post Responding to Risk in an Evolving Threat Landscape appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.2018 Voter Records for Sale As the United States midterm elections draw closer, concern surrounding voter information is on the rise, and for good reason. Records for nearly 35 million registered voters from 19 different states were found for sale on a hacker forum, with prices ranging from $500 to $12,500, depending on the state. […]

    The post Cyber News Rundown: Voter Records for Sale appeared first on Webroot Blog.


    0 0

    Reading Time: ~3 min.By now, you likely know that a Virtual Private Network (VPN) is essential to remaining safe when working remotely. But, once set up, how can you optimize your VPN to work well with your devices and meet your security needs? Here are our top five tips for maximizing your VPN experience. Pair it with an […]

    The post 5 Tips for Optimizing Your VPN Experience appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.Data Breach Affects Centers for Medicare & Medicaid Services The Centers for Medicare & Medicaid Services (CMS) announced last week they had discovered malicious activity within their direct enrollment pathway, which connects patients and healthcare brokers. At least 75,000 individuals were affected. The pathway has since been disabled to prevent further exposure. Until the pathway […]

    The post Cyber News Rundown: Medicare Data Breach appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.DemonBot Botnet Gaining Traction DemonBot, while not the most sophisticated botnet discovered to date, has seen a significant rise in usage over the last week. With the ability to take control of Hadoop cloud frameworks, DemonBot has been using the platform to carry out DDoS attacks across the globe. By exploiting Hadoop’s resource management functionality, […]

    The post Cyber News Rundown: DemonBot Rising appeared first on Webroot Blog.


    0 0

    Reading Time: ~5 min.You’re probably familiar with some of the most common requirements for creating passwords. A mix of upper and lowercase letters is a simple example. These are known as password constraints. They’re rules for how you must construct a password. If your password must be at least eight characters long, contain lower case, uppercase, numbers and […]

    The post Password Constraints and Their Unintended Security Consequences appeared first on Webroot Blog.


    0 0

    Reading Time: ~3 min.Threat researchers and other cybersecurity industry analysts spend much of their time trying to anticipate the next major malware strain or exploit with the potential to cause millions of dollars in damage, disrupt global commerce, or put individuals at physical risk by targeting critical infrastructure. However, a new Webroot survey of principals at 500 small […]

    The post Reducing Risk with Ongoing Cybersecurity Awareness Training appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.Data Breach Nabs HSBC Account Info HSBC has been monitoring some unauthorized access occurring over a ten-day period on their customer’s online accounts. During this time, attackers used credentials that were likely part of prior breaches to access numerous accounts. HSBC worked quickly to disable online access to any accounts that showed suspicious activity. The […]

    The post Cyber News Rundown: HSBC Data Breach appeared first on Webroot Blog.


    0 0

    Reading Time: ~3 min.What business owners and MSPs should know about the year’s biggest online retail holiday It’s no secret that Black Friday and Cyber Monday are marked by an uptick in online shopping. Cyber Monday 2017 marked the single largest day of online sales to date, with reported sales figures upwards of $6.5 billion. Data from Webroot […]

    The post Cyber Monday: Big Savings, Big Risks appeared first on Webroot Blog.


older | 1 | .... | 37 | 38 | (Page 39) | 40 | newer