Articles on this Page
- 11/16/18--07:42: _Cyber News Rundown:...
- 11/21/18--05:00: _How to Keep Your Ki...
- 11/26/18--07:46: _Charity Scams to Wa...
- 11/27/18--13:54: _What’s Next? Webroo...
- 11/30/18--05:00: _Cyber News Rundown:...
- 12/07/18--08:34: _Cyber News Rundown:...
- 12/13/18--05:00: _What Separates Webr...
- 12/14/18--05:00: _Cyber News Rundown:...
- 12/21/18--05:00: _Cyber News Rundown:...
- 12/21/18--08:00: _Cybersecurity Trend...
- 12/28/18--05:00: _Cyber News Rundown:...
- 01/04/19--05:00: _Cyber News Rundown:...
- 01/07/19--05:00: _Top 5 things SMBs s...
- 01/10/19--05:00: _The Must-Have Tech ...
- 01/11/19--05:00: _Cyber News Rundown:...
- 11/16/18--07:42: Cyber News Rundown: Infowars Hacked by Card Skimmers
- 11/21/18--05:00: How to Keep Your Kids Safe Online
- 11/26/18--07:46: Charity Scams to Watch Out for During the Holidays
- 11/27/18--13:54: What’s Next? Webroot’s 2019 Cybersecurity Predictions
- 11/30/18--05:00: Cyber News Rundown: USPS Exposes Personal Data
- 12/07/18--08:34: Cyber News Rundown: WeChat Ransomware
- 12/13/18--05:00: What Separates Webroot WiFi Security from Other VPNs?
- 12/14/18--05:00: Cyber News Rundown: Android Trojan Steals Credentials
- 12/21/18--05:00: Cyber News Rundown: Facebook Bug Exposes User Photos
- 12/21/18--08:00: Cybersecurity Trends to Watch Out for in 2019
- 01/04/19--05:00: Cyber News Rundown: Ransomware Hits Tribune Publishing
- 01/10/19--05:00: The Must-Have Tech Accessory for Students
- 01/11/19--05:00: Cyber News Rundown: Bad Apps Infect Google Play
Reading Time: ~2 min.Infowars Online Site Compromised by MageCart Attack Earlier this week, a security researcher found payment card-stealing scripts running on the Infowars online site. The scripts managed to stay active for nearly 24 hours. At least 1,600 users of the site may have been affected during this period, though many were returning customers who wouldn’t have […]
The post Cyber News Rundown: Infowars Hacked by Card Skimmers appeared first on Webroot Blog.
Reading Time: ~4 min.As digital natives become more immersed in and dependent upon technology, they are likely to experience “cyber fatigue,” which can be thought of cybersecurity complacency. Paired with the invincible feeling that often accompanies being young, this can be a dangerous combination. It’s easy to mistakenly believe that hacked devices and identity theft are things that […]
Reading Time: ~5 min.‘Tis the season of giving, which means scammers may try to take advantage of your good will. A surprising fact about American donation habits is that everyday folks like yourself are the single largest driver of charitable donations in the United States. Giving USA’s Annual Report on Philanthropy found that individuals gave $286.65 billion in […]
The post Charity Scams to Watch Out for During the Holidays appeared first on Webroot Blog.
Reading Time: ~4 min.At Webroot, we stay ahead of cybersecurity trends in order to keep our customers up-to-date and secure. As the end of the year approaches, our team of experts has gathered their top cybersecurity predictions for 2019. What threats and changes should you brace for? General Data Protection Regulation Penalties “A large US-based tech company will […]
The post What’s Next? Webroot’s 2019 Cybersecurity Predictions appeared first on Webroot Blog.
Reading Time: ~2 min.USPS Website Leaves Personal Data Available to Anyone Within the last week, The U.S. Postal Service (USPS) has been working to resolve a vulnerability that allowed any authenticated user to view and modify the personal information for any of the other 60 million users. Fortunately, USPS was quick to fix the vulnerability before any detectable […]
Reading Time: ~2 min.Touch ID Used to Scam Apple Users Two apps were recently removed from the Apple App Store after several users reported being charged large sums of money after installing the app and scanning their fingerprint. Both apps were fitness-related and had users scan their fingerprint immediately so they could monitor calories or track fitness progress. But […]
Reading Time: ~2 min.Virtual Private Networks (VPNs) are quickly becoming a fundamental necessity for staying safe online. From large corporations to family households, people are turning to VPNs to ensure their data is encrypted end to end. But as with any emerging technology, it’s easy to become overwhelmed with new and untested VPN options. So, how does Webroot® […]
The post What Separates Webroot WiFi Security from Other VPNs? appeared first on Webroot Blog.
Reading Time: ~2 min.Clemson Supercomputer Susceptible to Cryptojacking IT staff at Clemson University have been working to remove the recent introduction of a cryptominer on its supercomputer, known as Palmetto. As they compromised the system for the mining of Monero, the attackers’ ploy was only spotted due to spikes in computing power and rising operating costs for the supercomputer, […]
The post Cyber News Rundown: Android Trojan Steals Credentials appeared first on Webroot Blog.
Reading Time: ~2 min.Facebook API Bug Reveals Photos from 6.8 Million Users Facebook announced this week that an API bug had been found that allowed third-party apps to access all user photos, rather than only those posted to their timeline. The vulnerability was only available for 12 days in mid-September, but could still impact up to 6.8 million […]
The post Cyber News Rundown: Facebook Bug Exposes User Photos appeared first on Webroot Blog.
Reading Time: ~5 min.The cybersecurity landscape is in constant flux, keeping our team busy researching the newest threats to keep our customers safe. As the new year approaches, we asked our cybersecurity experts to predict which security trends will have the most impact in 2019 and what consumers should prepare for. Continued Growth of Cryptojacking “Cryptojacking will continue […]
Reading Time: ~2 min.Amazon User Receives Thousands of Alexa-Recorded Messages Upon requesting all his user data from Amazon, one user promptly received over 1,700 recorded messages from an Alexa device. Unfortunately, the individual didn’t own such a device. The messages were from a device belonging to complete stranger, and some of them could have easily been used to find […]
The post Cyber News Rundown: Amazon User Receives Thousands of Alexa-Recorded Messages appeared first on Webroot Blog.
Reading Time: ~2 min.American Newspapers Shutdown After Ransomware Attack Nearly all news publications owned by Tribune Publishing suffered disruptions in printing or distribution after the publisher was hit by a ransomware attack. Many of the papers across the country were delivered incomplete or hours or days late. Even some papers that had been sold off to other publishers […]
The post Cyber News Rundown: Ransomware Hits Tribune Publishing appeared first on Webroot Blog.
Reading Time: ~3 min.SMBs are overconfident about their cybersecurity posture. A survey of SMBs conducted by 451 Research found that in the preceding 24 months, 71% of respondents experienced a breach or attack that resulted in operational disruption, reputational damage, significant financial losses or regulatory penalties. At the same time, 49% of the SMBs surveyed said that cybersecurity […]
The post Top 5 things SMBs should consider when evaluating a cybersecurity strategy appeared first on Webroot Blog.
Reading Time: ~4 min.We live in a digital age where internet-connected devices are the norm. Our phones, our televisions, even our light bulbs are tied together in today’s tech ecosystem. For high school and college students, this degree of digital connection is the standard, and when school is in session, tech accessories are a popular way to customize […]
Reading Time: ~2 min.Malicious Apps Get Millions of Installs Google recently removed 85 apps from the Play Store after they were found to contain predatory adware. With over nine million combined downloads, the apps were mostly fake games or utility apps that began pushing a constant stream of full-screen ads to users until the app itself crashed. More […]