A successful Gartner Summit for Webroot
Webroot, the market leader in cloud-based, real-time Internet threat detection, recently returned from the 20th annual Gartner Security and Risk Management Summit in National Harbor, Maryland....
View ArticleNew Study Reveals Disparities Between Corporate Mobile Security Policies and...
In the new BYOD Security Report conducted by Webroot through first-of-its-kind research, Webroot examined the use and security of personal mobile devices in the work environment, looking at the...
View ArticleCryptolocker is not dead
Recently in the news the FBI filed a status report updating on the court-authorized measures to neutralize GameOver Zeus and Cryptolocker. While the report states that “all or nearly all” of the active...
View ArticleCritroni/Onion – Newest Addition to Encrypting Ransomware
In my last blog post about a week ago, I talked about how Cryptolocker and the like are not dead and we will continue to see more of them in action. It’s a successful “business model” and I don’t see...
View ArticleA Look at PC Gamer Security
In the new study on security and PC gamers, Webroot found that many gamers sacrifice their protection to maximize system performance and leave themselves vulnerable to phishing attacks and...
View Article8 Tips to Stay Safe Online
Yesterday, the New York Times published an exclusive story on what many are stating to be the largest series of hacks ever, all revealed by Hold Security in their latest report. With a report of over...
View ArticleZeroLocker
Recently in the news we saw FireEye and Fox-IT provide the ability to decrypt files encrypted by older crpytolocker variants. They used the command and control servers seized by the FBI during...
View ArticleSony’s PSN Network Haymaker’d by DDoS Attack; Exec’s Plane Grounded Over Bomb...
Sony had a rough weekend. And not just Sony; last weekend wasn’t the best time to be a gamer. Here’s the skinny… Early yesterday morning, Sony’s PlayStation Network (PSN for short) was hit with a...
View ArticleA Primer on BitCoin
Editors Note: One day, we found ourselves discussing the security of bitcoin, only to realize that many readers may not truly understand the digital currency. Luckily, a team member’s father, Eoin...
View ArticleThe Weekend of Nude Celebrity Selfies, iCloud, and How to Protect Your...
What do celebrities (mostly young and female), 4chan, hackers, Bitcoin, and iCloud have in common? They’re all ingredients of a scandalous Labor Day Weekend, one that was filled with celebrity ‘skin’,...
View ArticleCryptographic Locker
It seems as though every few weeks we see a new encrypting ransomware variant. It’s not surprising either since the business model of ransoming files for money is tried and true. Whether it’s important...
View ArticleApple’s Sept 9 Event: New (and larger) iPhones and (gasp), a Watch!
Well, September 9th is here, and the launch of Destiny, one of the most (if not the most) anticipated video games ever, isn’t the only major piece of news coming out of the tech world today. You may...
View Article5 million GMail accounts breached, and I was one of them
There is a bit of irony in this blog post, if you will. Over my time at Webroot, I have become a major advocate and vocal evangelist of digital security, from talking about major level breaches to...
View Article‘Bash’ Shellshocks the Internet – Here’s What You Should Know
Update: Apple has patched the Bash bug. For more info (including links to download the updates on your Mac), check out this TechCrunch report. As of last week, there’s a new security bug in the news,...
View ArticleSon of a Breach! Can Companies Just Safeguard Their Customers’ Data?
Just when consumers were starting to regain some company trust and safe-shopping stability after last year’s massive Target breach, a string of new large-scale company breaches quickly reminded us...
View ArticleWhat To Know About Apple and WireLurker
Everyone’s heard the saying ‘Macs aren’t malware-proof’, right? Oh, you haven’t? Count me not surprised. It could be due to the fact that that’s not an actual saying, but the more likely reason is that...
View ArticleWe analyze Cryptobot, aka Paycrypt
Recently during some research on encrypting ransomware we came across a new variant that brings some new features to the table. It will encrypt by utilizing the following javascript from being opened...
View ArticleA Recap of the JP Morgan Breach
There is a clear trend that every year there are bigger targets compromised with increased frequency with more personal data being collected. The recent attack on JP Morgan Chase is especially alarming...
View ArticleCoinVault
CoinVault Today we encountered a new type of encrypting ransomware that looks to be of the cryptographic locker family. It employs the same method of encryption and has a very similar GUI (kills VSS,...
View ArticleSafe Online Shopping, Happy Online Shopping – 5 Security Tips for the Holiday...
The holiday season is almost upon us, which means the holiday shopping season is also almost upon us. And as always, it’s bound to be a crazy time of scrambling for the biggest and best deals, both in...
View Article