Quantcast
Channel: Webroot Blog
Browsing all 1153 articles
Browse latest View live

Would You Like To Know My Social Security Number?

Reading Time: ~4 min. It’ll cost you a buck. Just like everyone else’s. The use of a Social Security Number (SSN) as unique identifiers has long been a contentious subject. SSNs were never intended to...

View Article


Image may be NSFW.
Clik here to view.

Building a Cybersecurity Talent Pipeline One Coding Challenge at a Time

Reading Time: ~4 min. Like many technology companies, Webroot is constantly on the hunt for a diverse pool of engineering and technical cybersecurity talent. According to Jon Oltsik, senior principal...

View Article


Image may be NSFW.
Clik here to view.

The Rise of Information Stealers

Reading Time: ~5 min. This is the second of a three-part report on the state of three malware categories: miners, ransomware, and information stealers.  As noted in the last blog, mining malware is on...

View Article

Cyber News Rundown: Apple Removes Facebook Research App

Reading Time: ~2 min. Facebook Research App Removed from App Store After seeing their Onavo VPN application removed from the Apple App Store last year, Facebook has re-branded the service as a...

View Article

Common WordPress Vulnerabilities & How to Protect Against Them

Reading Time: ~3 min. The WordPress website platform is a vital part of the small business economy, dominating the content management system industry with a 60% market share. It gives businesses the...

View Article


The Reality of Passphrase Token Attacks

Reading Time: ~4 min. In my blog, Password Constraints and Their Unintended Security Consequences, I advocate for the use of passphrases. Embedded in the comments section, one of our readers Ben makes...

View Article

Carbonite to Acquire Webroot

Reading Time: ~2 min. I’m excited to share that Webroot has entered into an agreement to be acquired by Carbonite, a leader in cloud-based data protection for consumers and businesses. Why do I think...

View Article

Cyber News Rundown: Phishing British Parliament

Reading Time: ~2 min. Members of British Parliament Targeted by Phishing Attack Dozens of MPs from the UK were recently subjected to malicious spam and unauthorized solicitations via their mobile...

View Article


Cyber News Rundown: Photography Site Breached

Reading Time: ~2 min. Popular Photography Site Breached A major photography site, 500px, recently discovered they had suffered a data breach in July of last year. Data ranging from name and email...

View Article


Image may be NSFW.
Clik here to view.

Avoid Unsecure IoT: Smart Device Shopping Tips

Reading Time: ~3 min. “Internet of things” (IoT) is a term that’s becoming increasingly commonplace in our daily lives. Internet-connected devices are being designed and implemented at a rapid clip,...

View Article

Cyber News Rundown: Phishing through Email Filter

Reading Time: ~2 min. Email Phishers Find New Filter Bypass Since email filters have gained popularity over the last decade, scammers have been forced to adapt their attacks. To bypass a normal URL...

View Article

A Cybersecurity Checklist for Modern SMBs

Reading Time: ~5 min. The landscape of digital security is rapidly shifting, and even the largest tech giants are scrambling to keep up with new data regulations and cybersecurity threats. Small to...

View Article

Image may be NSFW.
Clik here to view.

The Ransomware Threat isn’t Over. It’s Evolving.

Reading Time: ~6 min. This is the third of a three-part report on the state of three malware categories: miners, ransomware and information stealers. Ransomware is any malware that holds your data...

View Article


Cyber News Rundown: Botnet Hijacks Browsers

Reading Time: ~2 min. Fake Apex Legends App Spreads Malware As the popularity of the latest free-to-play battle royale pushes ever higher, malicious Apex Legends apps have been spotted in the Google...

View Article

Cyber News Rundown: New Ransomware Service Offers Membership

Reading Time: ~2 min. Ransomware as-a-Service Offers Tiered Membership Benefits Jokeroo is the latest ransomware-as-a-service (RaaS) to begin spreading through hacker forums, though it’s...

View Article


The Hidden Costs of ‘Free’ WiFi

Reading Time: ~3 min. The True Cost of Free WiFi Ease-of-access is a true double-edged sword. Like all powerful technologies, WiFi (public WiFi in particular) can be easily exploited. You may have read...

View Article

Cyber News Rundown: Georgia County Pays for Ransomware Threat

Reading Time: ~2 min. Georgia County Pays Six Figure Ransom to Restore IT Systems Following a ransomware attack earlier this month, officials in Jackson County, Georgia decided to pay a $400,000 ransom...

View Article


Image may be NSFW.
Clik here to view.

Post Coinhive, What’s Next for Cryptojacking?

Reading Time: ~2 min. In late February, the notorious cryptojacking script engine called Coinhive abruptly announced the impending end to its service. The stated reason: it was no longer economically...

View Article

HTTPS: Privacy vs. Security, and Where End Users and Security Culture Fit In

Reading Time: ~4 min. Since the dawn of IT, there’s been a very consistent theme among admins: end users are the weakest link in your network, organization, security strategy, fill-in-the-blank. We’ve...

View Article

Cyber News Rundown: Hacker Exposes 26 Million Personal Records

Reading Time: ~2 min. Gnosticplayers Adds 26 Million More Records for Sale After the first 3 major data dumps, which totaled over 600 million records, the hacker known as Gnosticplayers has released...

View Article
Browsing all 1153 articles
Browse latest View live