Twitter is a Hotbed for Crypto Scam Bots
Reading Time: ~3 min.The brazen theft of cryptocurrency has been an ongoing issue for years now, mostly affecting exchanges and users who fail to store their private keys securely. But what about scams...
View ArticleCyber News Rundown: Atlanta Ransomware Attack
Reading Time: ~2 min.The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for...
View ArticleRe-Thinking ‘Patch and Pray’
Reading Time: ~3 min.When WannaCry ransomware spread throughout the world last year by exploiting vulnerabilities for which there were patches, we security “pundits” stepped up the call to patch, as we...
View ArticleCyber News Rundown: Breaking Panera Bread
Reading Time: ~2 min.The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for...
View ArticleCyber News Rundown: Hacktivists Strike YouTube Music Videos
Reading Time: ~2 min.The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for...
View ArticleCyber News Rundown: Russia Bans Telegram
Reading Time: ~2 min.The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for...
View ArticleAfter the Hack: Tips for Damage Control
Reading Time: ~4 min.According to the Identity Theft Research Center, in 2017 alone, nearly 158 million social security numbers were stolen as a result of 1579 data breaches. Once a cybercriminal has...
View ArticleThe STEM Pipeline: What Can You Do?
Reading Time: ~2 min.Take Our Daughters And Sons To Work Day is today, and while your initial reaction may be to make a note to call in sick that day (heck, that was my gut instinct), resist the urge....
View ArticleCyber News Rundown: Amazon DNS Service Hijacked
Reading Time: ~2 min.The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for...
View ArticleRSAC 2018: “Clearing A Path for More Conversation and Context”
Reading Time: ~2 min.Two big trends stood out at RSAC 2018. Many organizations that once thought all threat intelligence was created equal have gained appreciation for quality data feeds that deliver...
View Article‘Smishing’: SMS and the Emerging Trend of Scamming Mobile Users via Text...
Reading Time: ~3 min.Text messages are now a common way for people to engage with brands and services, with many now preferring texts over email. But today’s scammers have taken a liking to text...
View ArticleDNS Protection Gets Major Updates
Reading Time: ~1 min.Our most recent release of the DNS Protection agent provided customers with added features and enhancements designed to improve the overall product experience and its capabilities...
View ArticleCyber News Rundown: Facebook Reveals “Clear History” Feature
Reading Time: ~2 min.The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for...
View ArticleCyber News Rundown: GDPR Edition
Reading Time: ~3 min.As the EU’s General Data Protection Regulation (GDPR) edges closer, we’re looking back on the five most significant stories during the lead up to its implementation. Read about...
View ArticleTech Support Scams: From Bad to Worse
Reading Time: ~2 min.Fake tech support scams aren’t going anywhere. In fact, recent data shows this type of social engineering attack is on the rise—with phony tech support calls, emails, and pop-ups...
View ArticleCyber News Rundown: Excel JavaScript Support May Open Door to Exploits
Reading Time: ~2 min.Crypto Mining Makes the Jump to Excel With the recent Microsoft release supporting JavaScript within Excel, it was only a matter of time before the scripting service was...
View ArticleBad Apps: Protect Your Smartphone from Mobile Malware
Reading Time: ~2 min.Smartphone apps make life easier, more productive, and more entertaining. But can you trust every app you come across? Malicious mobile apps create easy access to your devices for...
View ArticleCyber News Rundown: Chili’s PoS Breached
Reading Time: ~2 min.Chili’s Restaurant Reveals Payment Card Breach In the last week, officials have discovered a data breach that affects an unknown number of the chain’s 1,600 restaurants across the...
View ArticleCyber News Rundown: Comcast Router Bug
Reading Time: ~2 min.The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for...
View ArticleCyber News Rundown: Hackable Mercedes
Reading Time: ~2 min.The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for...
View Article