2020’s Most (and Least) Cyber-Secure States
Reading Time: ~ 2 min. For the past several years, Webroot and its partners have conducted a series of studies aimed at better understanding the attitudes, perspectives, and behaviors related to cyber...
View ArticleCyber News Rundown: Zoom Targeted by Hackers
Reading Time: ~ 2 min. Zoom Video Software Targeted by Hackers With much of the professional world now telecommuting, hackers have taken notice and are finding vulnerabilities within Zoom’s software to...
View ArticleCyber News Rundown: Malicious COVID-19 Websites Surge
Reading Time: ~ 2 min. Malicious COVID-19 Websites Surge In recent months, more than 136 thousand new domains have been registered that reference the current COVID-19 outbreak, many of which have yet...
View ArticleThe Problem with HTTPS
Reading Time: ~ 3 min. Despite the intent of ensuring safe transit of information to and from a trusted website, encrypted protocols (usually HTTPS) do little to validate that the content of certified...
View ArticleWhat’s Behind the Surge in Phishing Sites? Three Theories
Reading Time: ~ 3 min. One of the most notable findings to come from the Webroot 2020 Threat Report was the significant rise in the number of active phishing sites over 2019—a 640% rise, to be exact....
View ArticleCyber News Rundown: Ransomware Wrecks Florida City
Reading Time: ~ 2 min. Florida City Sees Lasting Effects of Ransomware Attack Nearly three weeks after the City of Jupiter, Florida suffered a ransomware attack that took many of their internal systems...
View ArticleDNS is on the Verge of a Major Overhaul
Reading Time: ~ 4 min. “One of the things about working in internet technology is nothing lasts forever… [Students] come to me and they say, ‘I want to do something that has an impact 20, 50, or 100...
View ArticleThe Truth about Hackers, in Black and White (and Grey)
Reading Time: ~ 4 min. Did you know there are three primary types of hacker—white hats, black hats, and grey hats—and that there are subcategories within each one? Despite what you may have heard, not...
View ArticleCyber News Rundown: Ransomware Hits LA Suburbs
Reading Time: ~ 2 min. Los Angeles Suburb Hit with Ransomware Last month, the City of Torrance, California fell victim to a ransomware attack that shut down many of their internal systems and demanded...
View Article5 Ways to Improve Business Cyber-Resilience
Reading Time: ~ 3 min. A popular military maxim speaks to the need for redundancy and it goes like this: “Two is one and one is none.” Redundancy is also a key principle when it comes to...
View ArticleCyber News Rundown: Hackers Aim at Oil Producers
Reading Time: ~ 2 min. As Oil Prices Drop, Hackers Take Aim at Producers With the recent crash in oil prices, and supply rapidly piling up, a new spear phishing campaign has begun targeting executives...
View ArticleMental Health and Mindful Tech
Reading Time: ~ 3 min. Anyone who has spent late nights scrolling through their social media feed or grinding on video games knows one thing is true: Technology can be a good thing, but only in...
View ArticlePoor Password Practices: The Curse of the Cybersecurity Risk Index Score
Reading Time: ~ 3 min. Your password passing habit may not be as be as harmless as you think. And yes, that includes Netflix login info too. That’s one finding to come out of our newly released study...
View ArticleCyber News Rundown: HMRC Takes Down COVID-19 Scam Sites
Reading Time: ~ 2 min. Adult Website Leaks Trove of Sensitive Data An recently discovered unsecured database belonging to the adult streaming site Cam4 was found to contain nearly 11 billion unique...
View ArticleAI and ML in Cybersecurity: Adoption is Rising, but Confusion Remains
Reading Time: ~ 3 min. If you’ve been working in the technology space for any length of time, you’ve undoubtedly heard about the rising importance of artificial intelligence (AI) and machine learning...
View ArticlePay Attention to the Hacker Behind the Hoodie
Reading Time: ~ 3 min. There’s a pretty common misconception among small businesses and medium-sized businesses (SMBs) that hackers only target large organizations. Unfortunately, this belief couldn’t...
View ArticleWhy Your Cyber Resilience Plan Doesn’t Include Windows 7
Reading Time: ~ 2 min. Our 2020 Threat Report shows increasing risks for businesses and consumers still running Windows 7, which ceased updates, support and patches earlier this year. This creates...
View ArticleThe Future of Work: Being Successful in the COVID Era and Beyond
Reading Time: ~ 3 min. Working from home is no longer something some of us can get away with some of the time. It’s become essential for our health and safety. So, what does the future of work look...
View ArticleCyber News Rundown: Bank of America Breach Reveals PPP Info
Reading Time: ~ 2 min. Bank of America Breach Reveals PPP Information After processing over 300,000 Paycheck Protection Program applications, Bank of America has revealed that a data breach occurred...
View ArticleCyber News Rundown: Trickbot Silently Targets Servers
Reading Time: ~ 2 min. TrickBot Silently Targets Servers Knowing that many domain controller servers are rarely shutdown or rebooted, the authors of TrickBot have made some changes to allow the...
View Article