Top Browser Plugins to Increase Browsing Security and Privacy
Here at Webroot, we take security seriously. With that being said, there is always more that you can do to improve your security and privacy while browsing online. Below is a list of browser plugins...
View ArticleThreat Intelligence: An Overview
Bring Threat Intelligence to the world of IoT Threat Intelligence has become common throughout the cyber security landscape used in traditional information technology platforms from next generation...
View ArticleThreat Recap: Week of January 31st
A lot happens in the security world, some big and some small, and many stories get lost in the mix. In an effort to keep our readers informed and updated, we present the Webroot Threat Recap,...
View ArticleFemale PC gamers and Online Security
In a 2016 survey of 500 PC gamers, Webroot discovered statistically significant differences in the ways that male and female gamers approach internet security, 3rd party modifications, and the way...
View ArticleSome notes on VirusTotal
Many of you are probably familiar with VirusTotal, a service that allows you to scan a file or URL using multiple antivirus and URL scanners. VirusTotal results are often used in write-ups about new...
View ArticleWhat IP/URL Based Threat Intelligence Can and Can’t do for the IoT
Part one of this series provided a high-level overview of Threat Intelligence, the underlying data types common in the current security landscape and how these data are gathered, analyzed and consumed....
View ArticleThreat Recap: Week of February 7th
A lot happens in the security world, some big and some small, and many stories get lost in the mix. In an effort to keep our readers informed and updated, we present the Webroot Threat Recap,...
View ArticleWhy Webroot is Proven Next-Generation Endpoint Security
Within the last several years, online threats have continued to evolve at disturbingly high rates, and are more robust than ever before. According to the data we’ve seen across the Webroot Threat...
View ArticleNew Ransomware PadCrypt: The first with Live Chat Support
A new ransomware has been discovered and what sets apart this variant from the rest is its implementation of a chat interface embedded into the product. That link for “Live Chat” will prompt the window...
View ArticleBuilding a secure IoT Gateway using Threat Intelligence
Parts 1 and 2 of this series provided an overview of Threat Intelligence and hopefully offered some understanding as to what role it can play in helping secure an IoT infrastructure. For those familiar...
View ArticleThreat Recap Week of Feb. 15
A lot happens in the security world, some big and some small, and many stories get lost in the mix. In an effort to keep our readers informed and updated, we present the Webroot Threat Recap,...
View ArticleLocky Ransomware
A new form of ransomware has hit the scene, and although this one has a playful nickname it is no fun at all. The bad news is that “Locky” ransomware will encrypt virtually every commonly used...
View ArticleCyber Threat Actors
Cyber threats come from a wide array of sources, but can be grouped into three categories: Hacktivists These are tech-savvy individuals who are normally motivated by morality. These individuals are...
View ArticleThreat Recap: Week of Feb. 22
A lot happens in the security world and many stories get lost in the mix. In an effort to keep our readers informed and updated, we present the Webroot Threat Recap, highlighting 5 major security news...
View ArticleThreat Insights and Trends from the 2016 Threat Brief
Intro from the 2016 Threat Brief: “2015 was yet another record year for cybercrime, during which more malware, malicious IPs, websites, and mobile apps were discovered than in any previous year. It...
View ArticleThreat Recap Week of March 4th
German Hospitals Latest Ransomware Target In the past week, several German hospitals have reported ransomware attacks on their internal systems. While one of the hospitals was able to minimize the...
View ArticleWebroot Supports Open Network Insight Project
On Monday of this week, Webroot joined Cloudera, the leading provider of modern data management and analytics systems built on Apache Hadoop, in announcing Open Network Insight (ONI) Project, a...
View ArticleWhat you need to know about the new KeRanger Ransomware.
Palo Alto Networks recently discovered ransomware hidden inside of the torrenting app ‘Transmission’. While this may come as a shock to those that still believe the Mac is a fortress that can’t be...
View ArticleHelping Organisations Stay Secure In An Unsecure Age
Seemingly every day, we’re reminded that companies need to work harder to stay secure during a time where cybercrime is rampant and many organizations remain vulnerable to attack. I’ve recently been...
View ArticleLove the City You Live In? So do Cybercriminals!
Myth: There is no link between your real-life location and your digital one. The truth is that the two are very much connected. Perhaps more importantly, then, is what this means when it comes to your...
View Article