Are you the publisher? Claim or contact us about this channel


Embed this content in your HTML

Search

Report adult content:

click to rate:

Account: (login)

More Channels


Channel Catalog


Channel Description:

Internet security threat updates and insights.
    0 0

    Reading Time: ~2 min.The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for all things security. Any questions? Just ask. Amazon IPs Rerouted for Several Hours Early Tuesday morning attackers compromised an ISP that allowed them to […]

    The post Cyber News Rundown: Amazon DNS Service Hijacked appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.Two big trends stood out at RSAC 2018. Many organizations that once thought all threat intelligence was created equal have gained appreciation for quality data feeds that deliver real-time information vs. crowdsourced or static lists. Endless alerts and flashy numbers are no longer enough. Companies want to know the “why?” and “what actions they can […]

    The post RSAC 2018: “Clearing A Path for More Conversation and Context” appeared first on Webroot Blog.


    0 0

    Reading Time: ~3 min.Text messages are now a common way for people to engage with brands and services, with many now preferring texts over email. But today’s scammers have taken a liking to text messages or smishing, too, and are now targeting victims with text message scams sent via shortcodes instead of traditional email-based phishing attacks. What do […]

    The post ‘Smishing’: SMS and the Emerging Trend of Scamming Mobile Users via Text Messages appeared first on Webroot Blog.


    0 0

    Reading Time: ~1 min.Our most recent release of the DNS Protection agent provided customers with added features and enhancements designed to improve the overall product experience and its capabilities delivered to end users. We revamped the network detection functionality to improve accuracy and speed for roaming and off-site clients who frequently change networks. We also addressed a variety […]

    The post DNS Protection Gets Major Updates appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for all things security. Any questions? Just ask. Cyberattack Shuts Down Mexico Central Bank Within the past week, several payment systems associated with Mexico’s central […]

    The post Cyber News Rundown: Facebook Reveals “Clear History” Feature appeared first on Webroot Blog.


    0 0

    Reading Time: ~3 min.As the EU’s General Data Protection Regulation (GDPR) edges closer, we’re looking back on the five most significant stories during the lead up to its implementation. Read about GDPR’s impact on data security and find out how to get prepared with five steps to compliance. What aspect of GDPR will have the biggest impact on […]

    The post Cyber News Rundown: GDPR Edition appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.Fake tech support scams aren’t going anywhere. In fact, recent data shows this type of social engineering attack is on the rise—with phony tech support calls, emails, and pop-ups peddling the digital equivalent of snake oil to unsuspecting internet users around the world. While many people have grown wise enough to spot the warning signs […]

    The post Tech Support Scams: From Bad to Worse appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.Crypto Mining Makes the Jump to Excel With the recent Microsoft release supporting JavaScript within Excel, it was only a matter of time before the scripting service was manipulated to mine cryptocurrency. Mere hours after the release, the first proof of concept appeared, with easy-to-replicate steps to get CoinHive functioning. While this proof of concept […]

    The post Cyber News Rundown: Excel JavaScript Support May Open Door to Exploits appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.Smartphone apps make life easier, more productive, and more entertaining. But can you trust every app you come across? Malicious mobile apps create easy access to your devices for Android and iOS malware to wreak havoc. And there are many untrusted and potentially dangerous apps lurking around in app stores determined to outsmart your smartphone. […]

    The post Bad Apps: Protect Your Smartphone from Mobile Malware appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.Chili’s Restaurant Reveals Payment Card Breach In the last week, officials have discovered a data breach that affects an unknown number of the chain’s 1,600 restaurants across the country. It is believed that the breach could affect customers who visited the restaurant between March and April of this year, and likely includes all payment information, […]

    The post Cyber News Rundown: Chili’s PoS Breached appeared first on Webroot Blog.