Would You Like To Know My Social Security Number?
Reading Time: ~4 min. It’ll cost you a buck. Just like everyone else’s. The use of a Social Security Number (SSN) as unique identifiers has long been a contentious subject. SSNs were never intended to...
View ArticleBuilding a Cybersecurity Talent Pipeline One Coding Challenge at a Time
Reading Time: ~4 min. Like many technology companies, Webroot is constantly on the hunt for a diverse pool of engineering and technical cybersecurity talent. According to Jon Oltsik, senior principal...
View ArticleThe Rise of Information Stealers
Reading Time: ~5 min. This is the second of a three-part report on the state of three malware categories: miners, ransomware, and information stealers. As noted in the last blog, mining malware is on...
View ArticleCyber News Rundown: Apple Removes Facebook Research App
Reading Time: ~2 min. Facebook Research App Removed from App Store After seeing their Onavo VPN application removed from the Apple App Store last year, Facebook has re-branded the service as a...
View ArticleCommon WordPress Vulnerabilities & How to Protect Against Them
Reading Time: ~3 min. The WordPress website platform is a vital part of the small business economy, dominating the content management system industry with a 60% market share. It gives businesses the...
View ArticleThe Reality of Passphrase Token Attacks
Reading Time: ~4 min. In my blog, Password Constraints and Their Unintended Security Consequences, I advocate for the use of passphrases. Embedded in the comments section, one of our readers Ben makes...
View ArticleCarbonite to Acquire Webroot
Reading Time: ~2 min. I’m excited to share that Webroot has entered into an agreement to be acquired by Carbonite, a leader in cloud-based data protection for consumers and businesses. Why do I think...
View ArticleCyber News Rundown: Phishing British Parliament
Reading Time: ~2 min. Members of British Parliament Targeted by Phishing Attack Dozens of MPs from the UK were recently subjected to malicious spam and unauthorized solicitations via their mobile...
View ArticleCyber News Rundown: Photography Site Breached
Reading Time: ~2 min. Popular Photography Site Breached A major photography site, 500px, recently discovered they had suffered a data breach in July of last year. Data ranging from name and email...
View ArticleAvoid Unsecure IoT: Smart Device Shopping Tips
Reading Time: ~3 min. “Internet of things” (IoT) is a term that’s becoming increasingly commonplace in our daily lives. Internet-connected devices are being designed and implemented at a rapid clip,...
View ArticleCyber News Rundown: Phishing through Email Filter
Reading Time: ~2 min. Email Phishers Find New Filter Bypass Since email filters have gained popularity over the last decade, scammers have been forced to adapt their attacks. To bypass a normal URL...
View ArticleA Cybersecurity Checklist for Modern SMBs
Reading Time: ~5 min. The landscape of digital security is rapidly shifting, and even the largest tech giants are scrambling to keep up with new data regulations and cybersecurity threats. Small to...
View ArticleThe Ransomware Threat isn’t Over. It’s Evolving.
Reading Time: ~6 min. This is the third of a three-part report on the state of three malware categories: miners, ransomware and information stealers. Ransomware is any malware that holds your data...
View ArticleCyber News Rundown: Botnet Hijacks Browsers
Reading Time: ~2 min. Fake Apex Legends App Spreads Malware As the popularity of the latest free-to-play battle royale pushes ever higher, malicious Apex Legends apps have been spotted in the Google...
View ArticleCyber News Rundown: New Ransomware Service Offers Membership
Reading Time: ~2 min. Ransomware as-a-Service Offers Tiered Membership Benefits Jokeroo is the latest ransomware-as-a-service (RaaS) to begin spreading through hacker forums, though it’s...
View ArticleThe Hidden Costs of ‘Free’ WiFi
Reading Time: ~3 min. The True Cost of Free WiFi Ease-of-access is a true double-edged sword. Like all powerful technologies, WiFi (public WiFi in particular) can be easily exploited. You may have read...
View ArticleCyber News Rundown: Georgia County Pays for Ransomware Threat
Reading Time: ~2 min. Georgia County Pays Six Figure Ransom to Restore IT Systems Following a ransomware attack earlier this month, officials in Jackson County, Georgia decided to pay a $400,000 ransom...
View ArticlePost Coinhive, What’s Next for Cryptojacking?
Reading Time: ~2 min. In late February, the notorious cryptojacking script engine called Coinhive abruptly announced the impending end to its service. The stated reason: it was no longer economically...
View ArticleHTTPS: Privacy vs. Security, and Where End Users and Security Culture Fit In
Reading Time: ~4 min. Since the dawn of IT, there’s been a very consistent theme among admins: end users are the weakest link in your network, organization, security strategy, fill-in-the-blank. We’ve...
View ArticleCyber News Rundown: Hacker Exposes 26 Million Personal Records
Reading Time: ~2 min. Gnosticplayers Adds 26 Million More Records for Sale After the first 3 major data dumps, which totaled over 600 million records, the hacker known as Gnosticplayers has released...
View Article