Are you the publisher? Claim or contact us about this channel


Embed this content in your HTML

Search

Report adult content:

click to rate:

Account: (login)

More Channels


Channel Catalog


Channel Description:

Internet security threat updates and insights.
    0 0

    Reading Time: ~4 min.If you saw a file called eicar.com on your computer, you might think it was malware. But, you would be wrong. Readers, if you haven’t yet met the EICAR test file, allow me to introduce you to it. If you have used the EICAR test file, let’s get a bit cozier with it. If you […]

    The post EICAR – The Most Common False Positive in the World appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.Banking Trojans Still Appearing in Google Play Store Multiple security researchers recently discovered a handful of banking trojans that have still managed to make their way into the Google Play app store, despite Google having increased its security to detect such apps. Many of the apps are disguised as astrology/horoscope software, but instead of reading […]

    The post Cyber News Rundown: Banking Trojans in Google Play appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.Massive Customer Database Left Exposed by Data Management Firm A security researcher recently found a database containing customer information for nearly half a billion users of Veeam software on an unsecured AWS server. Most of the data was contact information spanning from 2013 to 2017 and was likely used by the Veeam marketing team’s automated […]

    The post Cyber News Rundown: Big Data Mismanagement appeared first on Webroot Blog.


    0 0

    Reading Time: ~3 min.While ransomware, last year’s dominant threat, has taken a backseat to cryptomining attacks in 2018, it has by no means disappeared. Instead, ransomware has become a more targeted business model for cybercriminals, with unsecured remote desktop protocol (RDP) connections becoming the favorite port of entry for ransomware campaigns. RDP connections first gained popularity as attack […]

    The post Unsecure RDP Connections are a Widespread Security Failure appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.Firefox Vulnerability Leads to Crash A new denial-of-service (DoS) attack has been created with the ability to cause desktop versions of the browser Firefox to freeze or crash. Upon visiting sites where the malicious script is present, the user’s browser forces download requests for a massive junk file that can cause the IPC channel for […]

    The post Cyber News Rundown: Firefox Vulnerable to DoS Attack appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.Brazilian Bank Traffic Rerouted by Massive Botnet A botnet containing more than 100,000 routers and other devices was recently spotted hijacking traffic destined for several Brazilian banks. The hijacking victims are then sent to one of at least 50 confirmed phishing sites that will attempt to steal any information the user will provide. Backing this […]

    The post Cyber News Rundown: Botnet Targets Brazil’s Banks appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.Latest Windows 10 Update Removes User Files Microsoft recently pulled its latest update, version 1809, after several users complained about personal files being deleted. While some users were able to use third-party software to retrieve deleted files, users whose files wnet missing from the Documents folder are having a much trickier time without restoring from […]

    The post Cyber News Rundown: Windows 10 Update Deletes Files appeared first on Webroot Blog.


    0 0

    Reading Time: ~3 min.For the past 20 years, Webroot’s technology has been driven by our dedication to protecting users from malware, viruses, and other online threats. The release of Webroot® WiFi Security—a new virtual private network (VPN) app for phones, computers, and tablets—is the next step in fulfilling our commitment to protect everyone’s right to be secure in […]

    The post Webroot WiFi Security: Expanding Our Commitment to Security & Privacy appeared first on Webroot Blog.


    0 0

    Reading Time: ~3 min.There’s a reason major industry players have been discussing cybersecurity more and more: the stakes are at an all-time high for virtually every business today. Cybersecurity is not a matter businesses can afford to push off or misunderstand—especially small and medium-sized businesses (SMBs), which have emerged as prime targets for cyberattacks. The risk level for […]

    The post Responding to Risk in an Evolving Threat Landscape appeared first on Webroot Blog.


    0 0

    Reading Time: ~2 min.2018 Voter Records for Sale As the United States midterm elections draw closer, concern surrounding voter information is on the rise, and for good reason. Records for nearly 35 million registered voters from 19 different states were found for sale on a hacker forum, with prices ranging from $500 to $12,500, depending on the state. […]

    The post Cyber News Rundown: Voter Records for Sale appeared first on Webroot Blog.