Your Data, Their Devices: Accounting for Cybersecurity for Personal Computers
Reading Time: ~ 3 min. Nestled within our chapter on malware in the 2020 Webroot Threat Report is a comparison of infection rates between business and personal devices. The finding that personal...
View ArticleCyber News Rundown: Nintendo Accounts Breached
Reading Time: ~ 2 min. Nintendo Accounts Breached Stemming from a cyber-attack back in April, Nintendo has just announced that roughly 300,000 user accounts have been compromised, though most belong to...
View ArticleWe Need the Security Benefits of AI and Machine Learning Now More Than Ever
Reading Time: ~ 3 min. As these times stress the bottom lines of businesses and SMBs alike, many are looking to cut costs wherever possible. The problem for business owners and MSPs is that...
View ArticleCyber News Rundown: Knoxville Rocked by Ransomware
Reading Time: ~ 2 min. Ransomware Knocks Out Knoxville, TN Knoxville, Tennessee officials have been working over the past week to secure systems and determine if any sensitive information was stolen...
View ArticleWhy You Need More than Built-In Antivirus Protection
Reading Time: ~ 3 min. Most major tech blogs have run some variation of the following headline in recent months: Is it worth paying for an antivirus solution anymore? The insinuation, of course, is...
View ArticleOld Habits vs. New Normal in the Time of Coronavirus
Reading Time: ~ 3 min. It didn’t take long for COVID-19 to completely alter the way we work. Businesses that succeed in this rapidly changing environment will be the ones that adapt with the same...
View ArticleDoH Is Here to Stay: Why Businesses Should Embrace It
Reading Time: ~ 3 min. While the proliferation of encrypted DNS is being driven by consumer privacy, businesses will want to take notice. Encrypted DNS – also known as DNS over HTTPS, or DoH – obscures...
View Article5 ways to reduce risky habits online
Reading Time: ~ 4 min. After surveying more than 10,000 people in 50 states about their cybersecurity habits, we wound up with some pretty surprising results. Like the fact that tech experts...
View ArticleCyber News Rundown: WastedLocker Shuts Down US News Sites
Reading Time: ~ 2 min. WastedLocker Shuts Down US News Sites Over 30 news sites were compromised in the latest WastedLocker attack that affected many sites under a single parent company. Of the more...
View ArticleEvasive Scripts: What They Are, and What We’re Doing About Them
Reading Time: ~ 4 min. “What’s an evasive attack? At a very basic level, it’s exactly what it sounds like; it’s a cyberattack that’s designed to hide from you,” says Grayson Milbourne, Security...
View ArticleCyber News Rundown: Ragnar Locker
Reading Time: ~ 2 min. Ragnar locker Attacks Portuguese Energy Producer It was recently confirmed that Energias de Portugal (EDP), one of the largest energy producers in the world, has fallen victim to...
View ArticleThere Are Savings to be Had in Cybersecurity. Just Not Where You Might Think.
Reading Time: ~ 4 min. Prior to the outbreak of the novel coronavirus, Webroot’s annual Threat Report highlighted a 640% increase in active phishing sites on the web. However difficult it may be to...
View ArticleSummer fitness: Let’s get digital
Reading Time: ~ 3 min. Summer is upon us. For some, summer is all about physical fitness. While exercise is essential to our overall well-being, we shouldn’t forget about our digital fitness, either....
View ArticleCyber News Rundown: GoldenSpy
Reading Time: ~ 2 min. Malware Discovered in Chinese Tax Software As part of an official Chinese tax initiative, researchers have found multiple backdoors into mandatory tax software installed on all...
View ArticleThe Changing Face of Phishing: How One of the Most Common Attacks is Evolving
Reading Time: ~ 3 min. Most people are familiar with phishing attacks. After all, they’re one of the most common forms of data breach around. At their most basic, phishing attacks are attempts to steal...
View ArticleCyber News Rundown: ATM Jackpotting Attacks Rise
Reading Time: ~ 2 min. ATM Jackpotting Attacks on the Rise ATM manufacturer Diebold Nixdorf has identified a malicious campaign that uses proprietary software to “jackpot” the machines. The attack...
View ArticleBouncing Back from the Pandemic A Step-By-Step Guide for MSPs
Reading Time: ~ 3 min. To try to fight the isolation and uncertainty brought on by the COVID-19 outbreak, a few weeks ago we began what we’re referring to as “Office Hours” on the Webroot Community....
View ArticleCyber News Rundown: WasteLocker Ransomware
Reading Time: ~ 2 min. Garmin Hit with WastedLocker Ransomware Nearly a week after the company announced they had suffered a system outage, Garmin has finally admitted to falling victim to a ransomware...
View ArticleHack, Crash, Storm, Spill: Pick Your Poison
Reading Time: ~ 5 min. Don’t expect cybercriminals to go easy during a hurricane. Quite the opposite, in fact. Just like they’ve used the coronavirus pandemic to launch COVID-related malware scams,...
View ArticleCyber News Rundown: Twitter Hack Arrests
Reading Time: ~ 2 min. Multiple Individuals Charged for Twitter Hack Three people were charged with last month’s Twitter hack, which generated over $100,000 in bitcoin by hijacking high-profile...
View Article