Quantcast
Channel: Webroot Blog
Browsing all 1153 articles
Browse latest View live

2020’s Most (and Least) Cyber-Secure States

Reading Time: ~ 2 min. For the past several years, Webroot and its partners have conducted a series of studies aimed at better understanding the attitudes, perspectives, and behaviors related to cyber...

View Article


Cyber News Rundown: Zoom Targeted by Hackers

Reading Time: ~ 2 min. Zoom Video Software Targeted by Hackers With much of the professional world now telecommuting, hackers have taken notice and are finding vulnerabilities within Zoom’s software to...

View Article


Cyber News Rundown: Malicious COVID-19 Websites Surge

Reading Time: ~ 2 min. Malicious COVID-19 Websites Surge In recent months, more than 136 thousand new domains have been registered that reference the current COVID-19 outbreak, many of which have yet...

View Article

The Problem with HTTPS

Reading Time: ~ 3 min. Despite the intent of ensuring safe transit of information to and from a trusted website, encrypted protocols (usually HTTPS) do little to validate that the content of certified...

View Article

What’s Behind the Surge in Phishing Sites? Three Theories

Reading Time: ~ 3 min. One of the most notable findings to come from the Webroot 2020 Threat Report was the significant rise in the number of active phishing sites over 2019—a 640% rise, to be exact....

View Article


Cyber News Rundown: Ransomware Wrecks Florida City

Reading Time: ~ 2 min. Florida City Sees Lasting Effects of Ransomware Attack Nearly three weeks after the City of Jupiter, Florida suffered a ransomware attack that took many of their internal systems...

View Article

DNS is on the Verge of a Major Overhaul

Reading Time: ~ 4 min. “One of the things about working in internet technology is nothing lasts forever… [Students] come to me and they say, ‘I want to do something that has an impact 20, 50, or 100...

View Article

The Truth about Hackers, in Black and White (and Grey)

Reading Time: ~ 4 min. Did you know there are three primary types of hacker—white hats, black hats, and grey hats—and that there are subcategories within each one? Despite what you may have heard, not...

View Article


Cyber News Rundown: Ransomware Hits LA Suburbs

Reading Time: ~ 2 min. Los Angeles Suburb Hit with Ransomware Last month, the City of Torrance, California fell victim to a ransomware attack that shut down many of their internal systems and demanded...

View Article


5 Ways to Improve Business Cyber-Resilience

Reading Time: ~ 3 min. A popular military maxim speaks to the need for redundancy and it goes like this: “Two is one and one is none.” Redundancy is also a key principle when it comes to...

View Article

Cyber News Rundown: Hackers Aim at Oil Producers

Reading Time: ~ 2 min. As Oil Prices Drop, Hackers Take Aim at Producers With the recent crash in oil prices, and supply rapidly piling up, a new spear phishing campaign has begun targeting executives...

View Article

Mental Health and Mindful Tech

Reading Time: ~ 3 min. Anyone who has spent late nights scrolling through their social media feed or grinding on video games knows one thing is true: Technology can be a good thing, but only in...

View Article

Poor Password Practices: The Curse of the Cybersecurity Risk Index Score

Reading Time: ~ 3 min. Your password passing habit may not be as be as harmless as you think. And yes, that includes Netflix login info too. That’s one finding to come out of our newly released study...

View Article


Cyber News Rundown: HMRC Takes Down COVID-19 Scam Sites

Reading Time: ~ 2 min. Adult Website Leaks Trove of Sensitive Data An recently discovered unsecured database belonging to the adult streaming site Cam4 was found to contain nearly 11 billion unique...

View Article

AI and ML in Cybersecurity: Adoption is Rising, but Confusion Remains

Reading Time: ~ 3 min. If you’ve been working in the technology space for any length of time, you’ve undoubtedly heard about the rising importance of artificial intelligence (AI) and machine learning...

View Article


Pay Attention to the Hacker Behind the Hoodie

Reading Time: ~ 3 min. There’s a pretty common misconception among small businesses and medium-sized businesses (SMBs) that hackers only target large organizations. Unfortunately, this belief couldn’t...

View Article

Why Your Cyber Resilience Plan Doesn’t Include Windows 7

Reading Time: ~ 2 min. Our 2020 Threat Report shows increasing risks for businesses and consumers still running Windows 7, which ceased updates, support and patches earlier this year. This creates...

View Article


The Future of Work: Being Successful in the COVID Era and Beyond

Reading Time: ~ 3 min. Working from home is no longer something some of us can get away with some of the time. It’s become essential for our health and safety. So, what does the future of work look...

View Article

Cyber News Rundown: Bank of America Breach Reveals PPP Info

Reading Time: ~ 2 min. Bank of America Breach Reveals PPP Information After processing over 300,000 Paycheck Protection Program applications, Bank of America has revealed that a data breach occurred...

View Article

Cyber News Rundown: Trickbot Silently Targets Servers

Reading Time: ~ 2 min. TrickBot Silently Targets Servers Knowing that many domain controller servers are rarely shutdown or rebooted, the authors of TrickBot have made some changes to allow the...

View Article
Browsing all 1153 articles
Browse latest View live