Quantcast
Channel: Webroot Blog
Browsing all 1150 articles
Browse latest View live

Keep your personal data personal

It’s National Cybersecurity Awareness Month in the US and Stay Smart Online Week in Australia, so you might say that security is on the minds of more people around this time. So as we start taking the...

View Article


Tech Support Scams Continue

We’re regularly asked about phone calls from “Microsoft” claiming that your computer is infected, and whether or not it is a scam – it is. Sometimes it’s a call from another “tech support” company, or...

View Article


Tech Support Scams Continue

We’re regularly asked about phone calls from “Microsoft” claiming that your computer is infected, and whether or not it is a scam – it is. Sometimes it’s a call from another “tech support” company, or...

View Article

Tips for Improving Router Security

With the recent news of router vulnerabilities, we thought it would be an excellent time to provide a few tips for improving your router security. While nothing is hack-proof in the world we live in,...

View Article

Are antivirus testing scores a true reflection of our Mac product efficacy?...

In a world full of new malware, and various types of cyber threats continuing to pop up on a daily basis, the average consumer has reached a point where a good antivirus security solution is an...

View Article


Image may be NSFW.
Clik here to view.

What is a computer virus?

It is a long-standing joke that if you do a web search on any medical symptom, it will always lead to a web diagnosis of cancer. In the same manner, searching for any computer problem will always lead...

View Article

Image may be NSFW.
Clik here to view.

History of Mac Malware

  The subject that fan boys of each side love to argue about.  Mac malware.  The fact is that malware for Mac is real and it continues to grow as a problem.  In 2012 Apple removed the statements “It...

View Article

Tips for Card Security and Fraud Protection

Cyber-criminals love to hit consumers where it hurts, and I’d say the most vulnerable location would have to be our wallets. I frequently receive inquiries asking how a consumer can better secure their...

View Article


Are antivirus testing scores a true reflection of our Mac product efficacy?...

In a world full of new malware, and various types of cyber threats continuing to pop up on a daily basis, the average consumer has reached a point where a good antivirus security solution is an...

View Article


Image may be NSFW.
Clik here to view.

What is a computer virus?

It is a long-standing joke that if you do a web search on any medical symptom, it will always lead to a web diagnosis of cancer. In the same manner, searching for any computer problem will always lead...

View Article

Image may be NSFW.
Clik here to view.

What is a computer virus?

It is a long-standing joke that if you do a web search on any medical symptom, it will always lead to a web diagnosis of cancer. In the same manner, searching for any computer problem will always lead...

View Article

Why do we need National Cyber Security Awareness Month?

As the 12th annual National Cyber Security Awareness Month enters its final week, we’ll look at the future of technology and the potential vulnerabilities that come with it. As President Barack Obama...

View Article

Mobile Malware – A problem or not?

Recently I was asked to give my thoughts on mobile malware. I was asked this in relation to a number of reports released earlier in the year that were in my view misinterpreted.  At the time many...

View Article


FBI says to just pay the ransom

We all know cryptolocker and we all know the toll it’s taken on many individuals and companies. While the original cryptolocker has been shut down since FBI operation Tovar it has not stalled the many...

View Article

Cyber Security and the 2016 Presidential Elections

As National Cyber Security Awareness month is coming to an end, the 2016 presidential election cycle is building momentum and increasingly becoming our nation’s primary focus. Love it or hate it, the...

View Article


Image may be NSFW.
Clik here to view.

CRYPTOWALL 4.0

We know that Cryptowall 3.0 has been hugely successful for the cybercriminals netting them nearly $325 million in its debut year. With over 800 command and control URLs and over 400,000 attempted...

View Article

Image may be NSFW.
Clik here to view.

Is 2015 the Year of Mac Malware?

Lots of blogs, articles and posts have been circulating recently about the increase in mac malware, mostly due to the publishing of Bit9’s report. I think it is wise to clarify what is really happening...

View Article


Threat Recap: Week of November 20th

A lot happens in the security world, some big and some small, and many stories get lost in the mix. In an effort to keep our readers informed and updated, we present the Webroot ThreatBrief,...

View Article

Black Friday & Cyber Monday Security Tips

With the two most hectic shopping days of the year rapidly approaching, you may be preparing to nab a deal… but identity thieves are just as busy trying to nab your financial information. While you’re...

View Article

Image may be NSFW.
Clik here to view.

What’s in a name?

Any time a malware variant hits the news we get numerous requests for information. It is typically quite difficult to provide any information based on names that have been given to threats. A simple...

View Article
Browsing all 1150 articles
Browse latest View live