Lock Down Your Digital Identity
Reading Time: ~3 min. The last decade has been one of digital revolution, leading to the rapid adoption of new technology standards, often without the consideration of privacy ramifications. This has...
View ArticleCyber News Rundown: First GDPR Fine Issues in Poland
Reading Time: ~2 min. First GDPR Fine Issued in Poland The first fine issued from the Polish privacy regulator has been issued to an unnamed firm for quietly gathering personal data for over 6 million...
View ArticleHijacked Email Reply Chains
Reading Time: ~4 min. Although phishing has been around in various forms since the 1980s, our research shows it continues to evolve—and remains a major threat. These days, phishing tactics have gotten...
View ArticleCyber News Rundown: Massive Data Breach at Georgia Tech
Reading Time: ~2 min. Massive Data Breach at Georgia Tech It was recently revealed that the personal information on over 1.3 million people was illicitly accessed by hackers who breached Georgia Tech...
View ArticleFour Tips to Help Tidy Up Your Tech
Reading Time: ~4 min. This spring, many of us will roll up our sleeves and get down to business decluttering our homes. Garage sales will be held, basement storage rooms will be re-organized, and...
View ArticleHow To Keep Better Tabs on Your Connected Apps
Reading Time: ~5 min. Not that long ago, before data breaches dominated daily headlines, we felt secure with our social media apps. Conveniently, every website seemed to allow logging in with Facebook...
View ArticleCyber News Rundown: Tax Extortion Ransomware Scams Corporations
Reading Time: ~2 min. Tax Extortion Emails Bring Major Threats A new email campaign has been spotted threatening ransomware and DDoS attacks over fake tax documents allegedly held by the attackers if a...
View ArticleA Chat with Kiran Kumar: Webroot Product Director
Reading Time: ~4 min. The process of bringing a cybersecurity product to market can be long and tedious, but Kiran Kumar, Product Director at Webroot, loves to oversee all the moving parts. It keeps...
View ArticleCyber News Rundown: Phishing Attack on Global IT Outsourcer
Reading Time: ~2 min. Major IT Outsourcer Suffers After Phishing Attack Global IT services provider Wipro announced they are in the process of investigating a data possibly affecting some of their...
View ArticleThe Evolution of Cybercrime
Reading Time: ~5 min. From Landline Hacking to Cryptojacking By its very nature, cybercrime must evolve to survive. Not only are cybersecurity experts constantly working to close hacking loopholes and...
View ArticleNotice: What Happens on Public Computers, Stays on Public Computers
Reading Time: ~4 min. These are the places your digital tracks can be dug up. With a little sleuthing. Experts have warned for years of the risks of using public computers such as those found in...
View ArticleAntivirus vs. VPN: Do You Need Both?
Reading Time: ~3 min. Public concern about online privacy and security is rising, and not without reason. High-profile data breaches make headlines almost daily and tax season predictably increases...
View ArticleHigh Value Cryptocurrency Stolen by Hackers
Reading Time: ~2 min. Hackers Breach Private Keys to Steal Cryptocurrency A possible coding error allowed hackers to compromise at least 732 unique, improperly secured private keys used in the Ethereum...
View ArticleWebroot Culture: Serena Peruzzi Shares Her Side
Reading Time: ~4 min. Today we chat with Web Analyst Manager Serena Peruzzi. Serena constantly filters through the web to analyze content. Sometimes her position requires looking through difficult...
View ArticleCyber News Rundown: FBI Phishing Scam
Reading Time: ~2 min. “FBI Director” Phishing Campaign A new email phishing campaign has been making its way around the web that claims to be from “FBI Director Christopher Wray,” who would love to...
View ArticleA False Sense of Cybersecurity: The Riskiest States in America
Reading Time: ~5 min. Like many Americans, you might think your online habits are safe enough—or, at least, not so risky as to put you in danger for cybercrime. As it happens, most of us in the U.S....
View ArticleWhy Simplified Security Awareness Training Matters for MSPs and SMBs
Reading Time: ~3 min. In a recent report by the firm 451 Research, 62 percent of SMBs reported having a security awareness training program in place for their employees, with half being “homegrown”...
View ArticleWebroot Spotlight: Michael Balloni, Senior Manager of Software Development
Reading Time: ~3 min. From recruiting top talent to daily technical leadership, a day-in-a-life of a software engineering is never boring. After chatting with Webroot Senior Manager of Software...
View ArticleCyber News Rundown: Dharma Diversion
Reading Time: ~2 min. Dharma Ransomware Employs Diversion Tactics Researchers recently discovered a new ransomware variant that displays an ESET AV removal screen once launched in order to divert the a...
View ArticleCloud Services in the Crosshairs of Cybercrime
Reading Time: ~3 min. It’s a familiar story in tech: new technologies and shifting preferences raise new security challenges. One of the most pressing challenges today involves monitoring and securing...
View Article