Quantcast
Channel: Webroot Blog
Browsing all 1154 articles
Browse latest View live

Your Data, Their Devices: Accounting for Cybersecurity for Personal Computers

Reading Time: ~ 3 min. Nestled within our chapter on malware in the 2020 Webroot Threat Report is a comparison of infection rates between business and personal devices. The finding that personal...

View Article


Cyber News Rundown: Nintendo Accounts Breached

Reading Time: ~ 2 min. Nintendo Accounts Breached Stemming from a cyber-attack back in April, Nintendo has just announced that roughly 300,000 user accounts have been compromised, though most belong to...

View Article


We Need the Security Benefits of AI and Machine Learning Now More Than Ever

Reading Time: ~ 3 min. As these times stress the bottom lines of businesses and SMBs alike, many are looking to cut costs wherever possible. The problem for business owners and MSPs is that...

View Article

Cyber News Rundown: Knoxville Rocked by Ransomware

Reading Time: ~ 2 min. Ransomware Knocks Out Knoxville, TN Knoxville, Tennessee officials have been working over the past week to secure systems and determine if any sensitive information was stolen...

View Article

Why You Need More than Built-In Antivirus Protection

Reading Time: ~ 3 min. Most major tech blogs have run some variation of the following headline in recent months: Is it worth paying for an antivirus solution anymore? The insinuation, of course, is...

View Article


Old Habits vs. New Normal in the Time of Coronavirus

Reading Time: ~ 3 min. It didn’t take long for COVID-19 to completely alter the way we work. Businesses that succeed in this rapidly changing environment will be the ones that adapt with the same...

View Article

DoH Is Here to Stay: Why Businesses Should Embrace It

Reading Time: ~ 3 min. While the proliferation of encrypted DNS is being driven by consumer privacy, businesses will want to take notice. Encrypted DNS – also known as DNS over HTTPS, or DoH – obscures...

View Article

5 ways to reduce risky habits online

Reading Time: ~ 4 min. After surveying more than 10,000 people in 50 states about their cybersecurity habits, we wound up with some pretty surprising results. Like the fact that tech experts...

View Article


Cyber News Rundown: WastedLocker Shuts Down US News Sites

Reading Time: ~ 2 min. WastedLocker Shuts Down US News Sites Over 30 news sites were compromised in the latest WastedLocker attack that affected many sites under a single parent company. Of the more...

View Article


Image may be NSFW.
Clik here to view.

Evasive Scripts: What They Are, and What We’re Doing About Them

Reading Time: ~ 4 min. “What’s an evasive attack? At a very basic level, it’s exactly what it sounds like; it’s a cyberattack that’s designed to hide from you,” says Grayson Milbourne, Security...

View Article

Cyber News Rundown: Ragnar Locker

Reading Time: ~ 2 min. Ragnar locker Attacks Portuguese Energy Producer It was recently confirmed that Energias de Portugal (EDP), one of the largest energy producers in the world, has fallen victim to...

View Article

Image may be NSFW.
Clik here to view.

There Are Savings to be Had in Cybersecurity. Just Not Where You Might Think.

Reading Time: ~ 4 min. Prior to the outbreak of the novel coronavirus, Webroot’s annual Threat Report highlighted a 640% increase in active phishing sites on the web. However difficult it may be to...

View Article

Summer fitness: Let’s get digital

Reading Time: ~ 3 min. Summer is upon us. For some, summer is all about physical fitness. While exercise is essential to our overall well-being, we shouldn’t forget about our digital fitness, either....

View Article


Cyber News Rundown: GoldenSpy

Reading Time: ~ 2 min. Malware Discovered in Chinese Tax Software As part of an official Chinese tax initiative, researchers have found multiple backdoors into mandatory tax software installed on all...

View Article

The Changing Face of Phishing: How One of the Most Common Attacks is Evolving

Reading Time: ~ 3 min. Most people are familiar with phishing attacks. After all, they’re one of the most common forms of data breach around. At their most basic, phishing attacks are attempts to steal...

View Article


Cyber News Rundown: ATM Jackpotting Attacks Rise

Reading Time: ~ 2 min. ATM Jackpotting Attacks on the Rise ATM manufacturer Diebold Nixdorf has identified a malicious campaign that uses proprietary software to “jackpot” the machines. The attack...

View Article

Bouncing Back from the Pandemic A Step-By-Step Guide for MSPs

Reading Time: ~ 3 min. To try to fight the isolation and uncertainty brought on by the COVID-19 outbreak, a few weeks ago we began what we’re referring to as “Office Hours” on the Webroot Community....

View Article


Cyber News Rundown: WasteLocker Ransomware

Reading Time: ~ 2 min. Garmin Hit with WastedLocker Ransomware Nearly a week after the company announced they had suffered a system outage, Garmin has finally admitted to falling victim to a ransomware...

View Article

Hack, Crash, Storm, Spill: Pick Your Poison

Reading Time: ~ 5 min. Don’t expect cybercriminals to go easy during a hurricane. Quite the opposite, in fact. Just like they’ve used the coronavirus pandemic to launch COVID-related malware scams,...

View Article

Cyber News Rundown: Twitter Hack Arrests

Reading Time: ~ 2 min. Multiple Individuals Charged for Twitter Hack Three people were charged with last month’s Twitter hack, which generated over $100,000 in bitcoin by hijacking high-profile...

View Article
Browsing all 1154 articles
Browse latest View live