Threat Recap: Week of December 4th
Greek Bank Cyber Attacks Recently, several Greek banks were hit with a cyber attack that brought their systems to a halt for several hours. The hackers, claiming to be a group called the Armada...
View ArticleWhat are the security risks with using a router provided by your ISP?
Internet security isn’t just about your devices, but also what connects your devices to the internet. Here at Webroot we have seen an influx of customers having problems with ads popping up on their...
View ArticleThreat Recap: Week of Dec 7th
Top 5 Week of Dec. 7 UAE Bank Hack In the last week, a major financial institution in the United Arab Emirates was hacked, with customer information being ransomed for a sum of nearly $3 million USD....
View ArticleIT at Home for the Holidays
It’s that magical time of year for all technically minded folks: sysadmins, IT pros, nerds and gamers. It’s that time where you get to go home to family, gather around the fire, and fix their...
View ArticleRussians are not immune to Encrypting Ransomware
CryptoWall 4.0 users have found that Russian users are spared any encryption when the malware is deployed on their system. That’s because it checks for what keyboard is being used and if Russian is...
View ArticleWebroot’s 2015 SMB Threat Report: An Analysis
Recently, Webroot published 2015 SMB Threat Report: Are organizations completely ready to stop cyberattacks?, which included the results from a survey of 700 SMB decision makers worldwide about their...
View ArticleQuick Tips to Protect Your New (and old) Apple Devices
Apple has projected yet another record holiday for sales, but this should come as no surprise to fellow ‘Macheads’. I myself, am a huge fan of Apple and have been for a quite some time; I still have my...
View ArticleTop 11 Security resolutions for the New Year
2015 has been the worst year so far for security breaches. Although the state of online security reminds me of that scene in Office Space where Peter says that every day you see him is the worst day...
View ArticleTop Security Predictions for 2016
As 2015 comes to an end, we all look back at the huge list of big-name data breaches that occured, from passwords revealed to full on dating identities. It was not a pretty year for companies with...
View ArticleRansom32 – A RaaS that could be used on multiple OS
Update: We now have a soundbite of the music played after infection: https://www.webroot.com/blog/wp-content/uploads/2016/01/Ransom32_music.mp3 The RaaS (Ransomware as a Service) business model is...
View ArticleCleaning up your Mac
In support of January being Clean Up Your Computer Month and National Privacy Day on January 28th, here are some great tips to start 2016 off right. Let’s face it, we are all guilty of letting our...
View ArticleThreat Recap: Week of January 3rd
A lot happens in the security world, some big and some small, and many stories get lost in the mix. In an effort to keep our readers informed and updated, we present the Webroot ThreatBrief,...
View ArticleA look at a typical macro infection
For over a decade, one of the most common ways to infect a computer with malware has been the implementation of “macros” in Word and Excel documents. Macros are small scripts that automate a series of...
View ArticleThreat Recap: Week of January 10th
A lot happens in the security world, some big and some small, and many stories get lost in the mix. In an effort to keep our readers informed and updated, we present the Webroot ThreatBrief,...
View ArticleAs tax season approaches, beware of tax related scams
Tax season officially began on January 19th, and with tax season comes the inevitable rise in tax-related scams. Identity thieves tend to step up their game a bit during tax season, looking to get the...
View ArticleCrypto-ransomware – still a real worry
This week, we held our first BrightTALK webinar of 2016 (January 19th), talking about crypto-ransomware. I’ve got to admit I’m always overwhelmed at the numbers of people interested in this as a topic,...
View ArticleThreat Recap: Week of January 17th
A lot happens in the security world, some big and some small, and many stories get lost in the mix. In an effort to keep our readers informed and updated, we present the Webroot ThreatBrief,...
View ArticleWorst Passwords of 2015, Best Passwords of 2016
When it comes to digital security, little is as important as knowing how to create a strong password. An ideal password is easy enough to remember so that it doesn’t need to be written down, yet...
View ArticleWebroot’s Acceleration with Advancement of IoT
The IoT (Internet of Things) as a concept has been with us since the late 1990’s and has evolved from simple M2M (Machine-to-Machine) connectivity into a vision for Operational Productivity enabled by...
View ArticleThreat Recap: Week of January 24th
A lot happens in the security world, some big and some small, and many stories get lost in the mix. In an effort to keep our readers informed and updated, we present the Webroot ThreatBrief,...
View Article