Quantcast
Channel: Webroot Blog
Browsing all 1154 articles
Browse latest View live

Top Browser Plugins to Increase Browsing Security and Privacy

Here at Webroot, we take security seriously. With that being said, there is always more that you can do to improve your security and privacy while browsing online. Below is a list of browser plugins...

View Article


Threat Intelligence: An Overview

Bring Threat Intelligence to the world of IoT Threat Intelligence has become common throughout the cyber security landscape used in traditional information technology platforms from next generation...

View Article


Threat Recap: Week of January 31st

A lot happens in the security world, some big and some small, and many stories get lost in the mix. In an effort to keep our readers informed and updated, we present the Webroot Threat Recap,...

View Article

Image may be NSFW.
Clik here to view.

Female PC gamers and Online Security

In a 2016 survey of 500 PC gamers, Webroot discovered statistically significant differences in the ways that male and female gamers approach internet security, 3rd party modifications, and the way...

View Article

Some notes on VirusTotal

Many of you are probably familiar with VirusTotal, a service that allows you to scan a file or URL using multiple antivirus and URL scanners. VirusTotal results are often used in write-ups about new...

View Article


What IP/URL Based Threat Intelligence Can and Can’t do for the IoT

Part one of this series provided a high-level overview of Threat Intelligence, the underlying data types common in the current security landscape and how these data are gathered, analyzed and consumed....

View Article

Threat Recap: Week of February 7th

A lot happens in the security world, some big and some small, and many stories get lost in the mix. In an effort to keep our readers informed and updated, we present the Webroot Threat Recap,...

View Article

Why Webroot is Proven Next-Generation Endpoint Security

Within the last several years, online threats have continued to evolve at disturbingly high rates, and are more robust than ever before. According to the data we’ve seen across the Webroot Threat...

View Article


Image may be NSFW.
Clik here to view.

New Ransomware PadCrypt: The first with Live Chat Support

A new ransomware has been discovered and what sets apart this variant from the rest is its implementation of a chat interface embedded into the product. That link for “Live Chat” will prompt the window...

View Article


Building a secure IoT Gateway using Threat Intelligence

Parts 1 and 2 of this series provided an overview of Threat Intelligence and hopefully offered some understanding as to what role it can play in helping secure an IoT infrastructure. For those familiar...

View Article

Threat Recap Week of Feb. 15

A lot happens in the security world, some big and some small, and many stories get lost in the mix. In an effort to keep our readers informed and updated, we present the Webroot Threat Recap,...

View Article

Image may be NSFW.
Clik here to view.

Locky Ransomware

A new form of ransomware has hit the scene, and although this one has a playful nickname it is no fun at all. The bad news is that “Locky” ransomware will encrypt virtually every commonly used...

View Article

Cyber Threat Actors

Cyber threats come from a wide array of sources, but can be grouped into three categories: Hacktivists These are tech-savvy individuals who are normally motivated by morality. These individuals are...

View Article


Threat Recap: Week of Feb. 22

A lot happens in the security world and many stories get lost in the mix. In an effort to keep our readers informed and updated, we present the Webroot Threat Recap, highlighting 5 major security news...

View Article

Threat Insights and Trends from the 2016 Threat Brief

Intro from the 2016 Threat Brief: “2015 was yet another record year for cybercrime, during which more malware, malicious IPs, websites, and mobile apps were discovered than in any previous year. It...

View Article


Threat Recap Week of March 4th

  German Hospitals Latest Ransomware Target In the past week, several German hospitals have reported ransomware attacks on their internal systems. While one of the hospitals was able to minimize the...

View Article

Webroot Supports Open Network Insight Project

  On Monday of this week, Webroot joined Cloudera, the leading provider of modern data management and analytics systems built on Apache Hadoop, in announcing Open Network Insight (ONI) Project, a...

View Article


Image may be NSFW.
Clik here to view.

What you need to know about the new KeRanger Ransomware.

  Palo Alto Networks recently discovered ransomware hidden inside of the torrenting app ‘Transmission’. While this may come as a shock to those that still believe the Mac is a fortress that can’t be...

View Article

Helping Organisations Stay Secure In An Unsecure Age

  Seemingly every day, we’re reminded that companies need to work harder to stay secure during a time where cybercrime is rampant and many organizations remain vulnerable to attack.  I’ve recently been...

View Article

Image may be NSFW.
Clik here to view.

Love the City You Live In? So do Cybercriminals!

Myth: There is no link between your real-life location and your digital one. The truth is that the two are very much connected. Perhaps more importantly, then, is what this means when it comes to your...

View Article
Browsing all 1154 articles
Browse latest View live