Quantcast
Channel: Webroot Blog
Browsing all 1153 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Legitimate software apps impersonated in a blackhat SEO-friendly PUA...

Deceptive vendors of PUAs (Potentially Unwanted Applications) continue relying on a multitude of traffic acquisition tactics, which in combination with the ubiquitous for the market segment ‘visual...

View Article


Image may be NSFW.
Clik here to view.

Evolution of Encrypting Ransomware

Recently we’ve seen a big change in the encrypting ransomware family and we’re going to shed light on some of the newest variants and the stages of evolution that have led the high profile malware to...

View Article


Image may be NSFW.
Clik here to view.

DIY cybercrime-friendly (legitimate) APK injecting/decompiling app spotted in...

With millions of Android users continuing to acquire new apps through Google Play, cybercriminals continue looking for efficient and profitable ways to infiltrate Android’s marketplace using a variety...

View Article

Image may be NSFW.
Clik here to view.

Android.Koler – Android based ransomware

Recently, a new Android threat named Android.Koler has begun popping up in the news.  According to an article by ARS Technica, it reacts similar to other pieces of ransomware often found on Windows...

View Article

Image may be NSFW.
Clik here to view.

Malicious DIY Java applet distribution platforms going mainstream – part two

In a cybercrime ecosystem, dominated by client-side exploits serving Web malware exploitation kits, cybercriminals continue relying on good old fashioned social engineering tricks in an attempt to...

View Article


Symantec’s “AV is Dead” Is Not News

On Monday, an executive at Symantec declared “AV is dead.” He went on to repeat to several media outlets that protecting customers on their PC and Mac computers had become an impossible battle that...

View Article

Image may be NSFW.
Clik here to view.

Spamvertised ‘Error in calculation of your tax’ themed emails lead to malware

Cybercriminals continue populating their botnets through the persistent spamvertising of tens of thousands of legitimately looking malicious emails, impersonating popular brands, in an attempt to trick...

View Article

AV Isn’t Dead. It’s Evolving.

Since the WSJ report was released, endpoint security solutions have received a lot of media attention. As many have started to ask “Is AV really dead?”, I felt it was a good idea to talk about it from...

View Article


Image may be NSFW.
Clik here to view.

A peek inside a subscription-based DIY keylogging based type of...

Cybercriminals continuing to systematically release DIY (do-it-yourself) cybercrime-friendly offerings in an effort to achieve a ‘malicious economies of scale’ type of fraudulent model which is a...

View Article


Image may be NSFW.
Clik here to view.

Spamvertised ‘Notification of payment received’ themed emails lead to malware

PayPal users, watch what you click on! We’ve recently intercepted a currently circulating malicious spamvertised campaign which is impersonating PayPal in an attempt to trick socially engineered end...

View Article

Image may be NSFW.
Clik here to view.

Malicious JJ Black Consultancy ‘Computer Support Services’ themed emails lead...

Relying on the systematic and persistent spamvertising of tens of thousands of fake emails, as well as the impersonation of popular brands for the purpose of socially engineering gullible users into...

View Article

Image may be NSFW.
Clik here to view.

A peek inside a newly launched all-in-one E-shop for cybercrime-friendly...

Cybercriminals continue diversifying their portfolios of standardized fraudulent services, in an attempt to efficiently monetize their malicious ‘know-how’, further contributing to the growth of the...

View Article

Image may be NSFW.
Clik here to view.

Long run compromised accounting data based type of managed iframe-ing service...

In a cybercrime ecosystem dominated by DIY (do-it-yourself) malware/botnet generating releases, populating multiple market segments on a systematic basis, cybercriminals continue seeking new ways to...

View Article


Image may be NSFW.
Clik here to view.

Webroot returns from Automation Nation 2014

Webroot, the market leader in cloud-based, real-time Internet threat detection, recently returned from the fifth annual Automation Nation in Orlando, hosted by LabTech Software.  Labtech, a robust...

View Article

Image may be NSFW.
Clik here to view.

Malicious Web-based Java applet generating tool spotted in the wild

Despite the prevalence of Web based client-side exploitation tools as the cybercrime ecosystem’s primary infection vector, in a series of blog posts, we’ve been emphasizing on the emergence of...

View Article


Image may be NSFW.
Clik here to view.

Spamvertised ‘June invoice” themed emails lead to malware

Cybercriminals continue spamvertising tens of thousands of malicious emails on their way to socially engineer gullible end users, ultimately increasing their botnet’s infected population through the...

View Article

Image may be NSFW.
Clik here to view.

Successful Launch of Webroot for Gamer at E3

Webroot, the market leader in cloud-based, real-time Internet threat detection, recently returned from the 18th annual Electronic Entertainment Expo, or E3 for short, hosted by the Entertainment...

View Article


Image may be NSFW.
Clik here to view.

Spamvertised ‘Customer Daily Statement’ themed emails lead to malware

Cybercriminals continue to efficiently populate their botnets, through the systematic and persistent spamvertising of tens of thousands of fake emails, for the purpose of socially engineering gullible...

View Article

Image may be NSFW.
Clik here to view.

A peek inside a commercially available Android-based botnet for hire

Relying on the systematic release of DIY (do-it-yourself) mobile malware generating tools, commercial availability of mobile malware releases intersecting with the efficient exploitation of legitimate...

View Article

Image may be NSFW.
Clik here to view.

A peek inside the online romance scam.

Online dating can be rough, and no matter how many safeguards are in place in the multiple legitimate dating websites out there, the scammers are getting around the blocks and still luring in potential...

View Article
Browsing all 1153 articles
Browse latest View live