Vaporizer chargers can contain malware
Vaporizers (AKA E-cigarettes) have been gaining some serious traction and widespread use over the past few years. The sudden surge of popularity isn’t too surprising considering the fact that the...
View ArticleSocial Engineering improvements keep Rogues/FakeAV a viable scam
The threat landscape has been accustomed to rogues for a while now. They’ve been rampant for the past few years and there likely isn’t any end in sight to this scam. These aren’t complex pieces of...
View ArticleBreach Therapy: 10 Companies Who Can’t Wait For 2014 To Be Over
Whether it be iPhones with bigger screens, major video game releases to make next-gen systems finally worth it, or wearables that are actually appealing to consumers, it’s safe to say any technological...
View ArticleWhy 2015 will be the year of cloud attacks
Several cyber take downs occurred this year when hackers infiltrated Home Depot, Michaels, iCloud, JP Morgan and the list just goes on. And while consumers and companies have been hit hard in 2014, our...
View ArticleHacking in Hollywood
It’s generally understood that Hollywood will always put their own spin on actions in order to help tell a story. That’s part of the movie and TV magic, or artistic license, that directors take when...
View ArticleDid Blackhat just break the hacker movie stereotype?
(Yes, he’s Thor in other movies, but that doesn’t mean he can’t hack in Blackhat) Blackhat is out today in theaters, and we were lucky enough to have an advanced screening of the film alongside our...
View ArticleLenovo Support Page Hacked
In possible retaliation to the Superfish MITM software installed on Lenovo consumer machines, hackers looking to be representing Lizard Squad have hacked Lenovo’s support page through DNS hijack....
View ArticleThe Threat Landscape is Expanding. Are You Ready for it?
This blog is syndicated from the LabTech Software Blog: http://www.labtechsoftware.com/blog/antivirus-and-anti-malware-tips/ Think your clients are covered? Think again. This year’s epic flu season...
View ArticleMobile World Congress 2015 – The Big Launches
Mobile World Congress is the biggest tech show focusing on, wait for it, mobile technology in the world. With many of the big announcements having occurred at the beginning it’s time for us to look and...
View ArticleTeslaCrypt – Encrypting ransomware that now grabs your games
The encrypting ransomware business model is hugely successful and isn’t going away any time soon (possibly ever). This latest variant not only encrypts the normal scope of valued files, but it now...
View ArticleWebroot at RSA Conference 2015
Webroot is excited to be returning as sponsor and briefing presenter of the 2015 RSA Conference in San Francisco, California. From April 20th to the 24th, the Bay Area will host one of the largest...
View ArticleFake Security Scams – 2015 Edition
New Year, Similar Scams In 2013, I wrote an article talking about the popular Fake Microsoft Security Scams that were doing the rounds. As expected, these type of scams have continued to grow in...
View ArticleA Recap of RSA 2015
Last week marked one of the largest security conferences in the world, and with RSA 2015 now to a close, it is time to look back at what we shared, learned, and shown to the over 30,000 attendees of...
View ArticleGoogle’s new Chrome extension is worth downloading
Yesterday, Google announced the release of their newest Chrome extension, Password Alert. The new free tool is designed to warn users of the popular browser when they are entering their Google...
View ArticleAlphaCrypt
We’ve encountered yet another encrypting ransomware variant and at this point it’s expected since the scam has exploaded in popularity since it’s inception in late 2013. This one has a GUI that is...
View ArticleRombertik
Yesterday in the news we saw a huge spike in the interest of the Rombertik malware. Rombertik infiltrates the computer through email phishing attacks that drop as a .scr screen saver executable that...
View ArticleWhatsApp Spam Emails Making a Comeback
In 2013 we shared a series of blog posts about several WhatsApp scams making the rounds redirecting people to pharmaceutical sites and malware. In recent weeks we have seen that these scams have made a...
View ArticleThe OPM data breach was probably inevitable
Breaches big and small have been in the news, from small organizations losing banking files to global groups like Sony losing seemingly everything to hackers. But with the recent Office of Personnel...
View ArticleHappy Video Game Day 2015
Webroot would like to wish our fellow gamers a happy Video Game Day! To celebrate this epic game playing day, we want to help keep you safe and highlight the top motivation for PC gaming attacks....
View ArticleA Brief History of Malware
Malware has come a long way in 30 years. Back in the 70s, the idea of malicious software was an interesting thought experiment. What if computer programs could take control of a computer? What if they...
View Article