Quantcast
Channel: Webroot Blog
Browsing all 1153 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Twitter is a Hotbed for Crypto Scam Bots

Reading Time: ~3 min.The brazen theft of cryptocurrency has been an ongoing issue for years now, mostly affecting exchanges and users who fail to store their private keys securely. But what about scams...

View Article


Cyber News Rundown: Atlanta Ransomware Attack

Reading Time: ~2 min.The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for...

View Article


Image may be NSFW.
Clik here to view.

Re-Thinking ‘Patch and Pray’

Reading Time: ~3 min.When WannaCry ransomware spread throughout the world last year by exploiting vulnerabilities for which there were patches, we security “pundits” stepped up the call to patch, as we...

View Article

Cyber News Rundown: Breaking Panera Bread

Reading Time: ~2 min.The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for...

View Article

Cyber News Rundown: Hacktivists Strike YouTube Music Videos

Reading Time: ~2 min.The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for...

View Article


Cyber News Rundown: Russia Bans Telegram

Reading Time: ~2 min.The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for...

View Article

Image may be NSFW.
Clik here to view.

After the Hack: Tips for Damage Control

Reading Time: ~4 min.According to the Identity Theft Research Center, in 2017 alone, nearly 158 million social security numbers were stolen as a result of 1579 data breaches. Once a cybercriminal has...

View Article

The STEM Pipeline: What Can You Do?

Reading Time: ~2 min.Take Our Daughters And Sons To Work Day is today, and while your initial reaction may be to make a note to call in sick that day (heck, that was my gut instinct), resist the urge....

View Article


Cyber News Rundown: Amazon DNS Service Hijacked

Reading Time: ~2 min.The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for...

View Article


RSAC 2018: “Clearing A Path for More Conversation and Context”

Reading Time: ~2 min.Two big trends stood out at RSAC 2018. Many organizations that once thought all threat intelligence was created equal have gained appreciation for quality data feeds that deliver...

View Article

Image may be NSFW.
Clik here to view.

‘Smishing’: SMS and the Emerging Trend of Scamming Mobile Users via Text...

Reading Time: ~3 min.Text messages are now a common way for people to engage with brands and services, with many now preferring texts over email. But today’s scammers have taken a liking to text...

View Article

DNS Protection Gets Major Updates

Reading Time: ~1 min.Our most recent release of the DNS Protection agent provided customers with added features and enhancements designed to improve the overall product experience and its capabilities...

View Article

Cyber News Rundown: Facebook Reveals “Clear History” Feature

Reading Time: ~2 min.The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for...

View Article


Cyber News Rundown: GDPR Edition

Reading Time: ~3 min.As the EU’s General Data Protection Regulation (GDPR) edges closer, we’re looking back on the five most significant stories during the lead up to its implementation. Read about...

View Article

Tech Support Scams: From Bad to Worse

Reading Time: ~2 min.Fake tech support scams aren’t going anywhere. In fact, recent data shows this type of social engineering attack is on the rise—with phony tech support calls, emails, and pop-ups...

View Article


Cyber News Rundown: Excel JavaScript Support May Open Door to Exploits

Reading Time: ~2 min.Crypto Mining Makes the Jump to Excel With the recent Microsoft release supporting JavaScript within Excel, it was only a matter of time before the scripting service was...

View Article

Bad Apps: Protect Your Smartphone from Mobile Malware

Reading Time: ~2 min.Smartphone apps make life easier, more productive, and more entertaining. But can you trust every app you come across? Malicious mobile apps create easy access to your devices for...

View Article


Cyber News Rundown: Chili’s PoS Breached

Reading Time: ~2 min.Chili’s Restaurant Reveals Payment Card Breach In the last week, officials have discovered a data breach that affects an unknown number of the chain’s 1,600 restaurants across the...

View Article

Cyber News Rundown: Comcast Router Bug

Reading Time: ~2 min.The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for...

View Article

Cyber News Rundown: Hackable Mercedes

Reading Time: ~2 min.The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for...

View Article
Browsing all 1153 articles
Browse latest View live