Are you the publisher? Claim or contact us about this channel

Embed this content in your HTML


Report adult content:

click to rate:

Account: (login)

More Channels

Channel Catalog

Channel Description:

Internet security threat updates and insights.
    0 0

    Reading Time: ~2 min.The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for all things security. Any questions? Just ask. 92 Million Genealogy Site Accounts Compromised Earlier this week, genealogy and DNA testing site MyHeritage revealed it […]

    The post Cyber News Rundown: MyHeritage Breached appeared first on Webroot Blog.

    0 0

    Reading Time: ~3 min.Cyberattacks are on the rise, with UK firms being hit, on average, by over 230,000 attacksin 2017. Managed service providers (MSPs) need to make security a priority in 2018, or they will risk souring their relationships with clients. By following 3 simple MSP best practices consisting of user education, backup and recovery, and patch management, […]

    The post 3 MSP Best Practices for Protecting Users appeared first on Webroot Blog.

    0 0

    Reading Time: ~2 min.Apple Bans All Cryptocurrency Mining Apps from App Store Apple has made several policy changes over the last few days that will effectively ban all cryptocurrency mining features from apps in the App Store. This change comes not long after Apple removed an app called Calender 2, which silently began background mining for Monero but […]

    The post Cyber News Rundown: Apple Bans Crypto Mining Apps appeared first on Webroot Blog.

    0 0

    Reading Time: ~4 min.I had the privilege of giving a keynote on one of my favorite topics, busting myths around artificial intelligence (AI) and machine learning (ML), during DattoCon 2018 this week. Webroot has been doing machine learning for more than a decade and consider this aspect one of our key differentiators for our solutions. However, for many […]

    The post Parsing the Distinction Between AI & Machine Learning appeared first on Webroot Blog.

    0 0

    Reading Time: ~4 min.We’ve seen some tricky techniques used by cybercriminals to distribute malware through social media. One common threat begins with a previously compromised Facebook account sending deceptive messages that contain SVG image attachments via Facebook Messenger. (The SVG extention is an XML-based vector image format for two-dimensional graphics with support for interactivity and animation.) Cybercriminals prefer […]

    The post Social Media Malware is Deviant, Destructive appeared first on Webroot Blog.

    0 0

    Reading Time: ~2 min.Weaponized USB Drives Targeting Japan and South Korea In an effort to target air-gapped internal systems, a new wave of weaponized USB drives has been found throughout Japanese and South Korean organizations. While these attacks are relatively uncommon, that only heightens the threat as most companies are ill-prepared for such an attack and have created […]

    The post Cyber News Rundown: Weaponized USB Drives appeared first on Webroot Blog.

    0 0

    Reading Time: ~2 min.Canadian college breach targets thousands Last Friday, Algonquin College officials announced that an earlier data breachpotentially affected thousands of current and former students, as well as employees. While it is still unclear exactly what systems were affected, the officials have been working to contact all potential victims and inform them of the situation. What’s more […]

    The post Cyber News Rundown: Adidas US customers’ personal information stolen appeared first on Webroot Blog.

    0 0

    Reading Time: ~3 min.With cybercrime damages set to cost the world $6 trillion annually by 2021, a new bar has been set for cybersecurity teams across industries to defend their assets. This rings especially true for IT service providers, who are entrusted to keep their clients’ systems and IT environments safe from cybercriminals. These clients are typically small […]

    The post 3 Cyber Threats IT Providers Should Protect Against appeared first on Webroot Blog.

    0 0

    Reading Time: ~2 min.Ticketmaster Snafu Only Tip of the Iceberg After last month’s Ticketmaster breach, a follow-up investigation found it to be part of a larger payment card compromising campaign affecting more than 800 online retail sites worldwide. The cause of the breach appears to stem from the third-party breaches of several Ticketmaster suppliers, which allowed hackers to […]

    The post Cyber News Rundown: Ticketmaster Hack Reveals Mega Breach appeared first on Webroot Blog.

    0 0

    Reading Time: ~3 min.While one-click shopping on Amazon (or, for that matter) seems super easy when you’re the consumer, there are a lot of complex strategies and processes going on behind the scenes. We chat with Cathy Ondrak, product owner for, to get a glimpse behind the curtain. In her role, Cathy works with developers, business […]

    The post Get to know Cathy Ondrak, Product Owner appeared first on Webroot Blog.