Category: Webroot Blog

How IT Will Prevail in the 2021 Cyber-Demic

Read the original article: How IT Will Prevail in the 2021 Cyber-Demic While we can all rejoice that 2020 is over, cybersecurity experts agree we haven’t seen the last of the pandemic-related rise in cyberattacks. Throughout the last year, we’ve…

Cyber News Rundown: Dairy Farm Ransomware

Read the original article: Cyber News Rundown: Dairy Farm Ransomware Dairy farm group faces $30 million ransom The Dairy Farm Group, one of the largest retailers in Asia, has suffered a ransomware attack by the REvil group, which has demanded…

Cyber News Rundown: Cryptomining Malware Resurgent

Read the original article: Cyber News Rundown: Cryptomining Malware Resurgent Skyrocketing Bitcoin prices prompt resurgence in mining malware As the price of the cryptocurrency Bitcoin pushes record highs, there’s been a corresponding resurgence in cryptomining malware. Illicit miners had slipped…

Cyber News Rundown: Cryptomining Malware Resurgent

Read the original article: Cyber News Rundown: Cryptomining Malware Resurgent Skyrocketing Bitcoin prices prompt resurgence in mining malware As the price of the cryptocurrency Bitcoin pushes record highs, there’s been a corresponding resurgence in cryptomining malware. Illicit miners had slipped…

Maze Ransomware is Dead. Or is it?

Read the original article: Maze Ransomware is Dead. Or is it? “It’s definitely dead,” says Tyler Moffitt, security analyst at Carbonite + Webroot, OpenText companies. “At least,” he amends, “for now.” Maze ransomware, which made our top 10 list for…

Cyber News Rundown: Trickbot Spreads Via Subway Emails

Read the original article: Cyber News Rundown: Trickbot Spreads Via Subway Emails Trickbot spreading through Subway company emails Customers of Subway U.K. have been receiving confirmation emails for recent orders that instead contain malicious links for initiating Trickbot malware downloads.…

Staying a Step Ahead of the Hack

Read the original article: Staying a Step Ahead of the Hack Hackers, never at a loss for creative deception, have engineered new tactics for exploiting the weakest links in the cybersecurity chain: ourselves! Social engineering and business email compromise (BEC)…

Cyber News Rundown: Biological Worries Over Malware Attacks

Read the original article: Cyber News Rundown: Biological Worries Over Malware Attacks Biological Worries Over Malware Attacks Researchers have recently unveiled the latest potential victim for malware authors: biological laboratories. By illicitly accessing these facilities, hackers may be able to…

Cyber News Rundown: REvil Ransomware Strikes

Read the original article: Cyber News Rundown: REvil Ransomware Strikes REvil Ransomware Strikes Hosting Provider In recent days the web hosting provider Managed.com has been working to recover from a ransomware attack targeting many of their core systems. While the…

6 Tips for a More Cyber-Secure Holiday Season

Read the original article: 6 Tips for a More Cyber-Secure Holiday Season In any other year, many of us would be gearing up for airline travel, big family dinners, cocktail hours or potlucks with friends, and much more. But with…

What’s the deal with security product testing anyway?

Read the original article: What’s the deal with security product testing anyway? It’s common for savvy online shoppers to check third-party reviews before making an online purchasing decision. That’s smart, but testing the efficacy of security software can be a…

Cyber News Rundown: Flood of Phony IRS Emails

Read the original article: Cyber News Rundown: Flood of Phony IRS Emails Phony IRS Emails Flooding Inboxes Upwards of 70,000 inboxes have been receiving spam claiming to be from the IRS threatening legal action for late or missing payments. Most…

Employee Spotlight: From Building Code to Building Teams

Read the original article: Employee Spotlight: From Building Code to Building Teams Webroot is a dynamic team of hard-working individuals with diverse backgrounds. One of those hard-working individuals is Ben Jackson, Senior Manager of Software Development, Engineering. Ben started off…

Cyber News Rundown: Maze Ransomware Shuts Down

Read the original article: Cyber News Rundown: Maze Ransomware Shuts Down Maze Ransomware Group Ends Operations A press release issued this week announced the end of the Maze ransomware group’s data theft operations. In the release, the Maze authors revealed…

The Importance of Mobile Security for Safe Browsing

Read the original article: The Importance of Mobile Security for Safe Browsing Mobile devices have become an indispensable part of our lives. By the time we’re teenagers, we’re already tethered to technology that lives in our pockets and connects us…

The Nastiest Malware of 2020

Read the original article: The Nastiest Malware of 2020 For the third year running, we’ve examined the year’s biggest cyber threats and ranked them to determine which ones are the absolute worst. Somewhat unsurprisingly, phishing and RDP-related breaches remain the…

The Nastiest Malware of 2020

Read the original article: The Nastiest Malware of 2020 For the third year running, we’ve examined the year’s biggest cyber threats and ranked them to determine which ones are the absolute worst. Somewhat unsurprisingly, phishing and RDP-related breaches remain the…

What DoH Can Really Do

Read the original article: What DoH Can Really Do Fine-tuning privacy for any preference A DNS filtering service that accommodates DNS over HTTPS (DoH) can strengthen an organization’s ability to control network traffic and turn away threats. DoH can offer…

Cyber News Rundown: Child Smartwatch Backdoored

Read the original article: Cyber News Rundown: Child Smartwatch Backdoored Backdoor Found in Children’s Smartwatch Researchers have discovered that the X4, made by Norwegian smartwatch seller Xplora, contains a backdoor that could allow for information to be stolen. The X4…

Cyber News Rundown: LokiBot Attacks Increase

Read the original article: Cyber News Rundown: LokiBot Attacks Increase DHS Announces Massive Increase in LokiBot Attacks By monitoring and tracking of cyberattacks over 2020, U.S. Department of Homeland Security (DHS) officials have uncovered a significant increase in cyberattacks being…

Cyber Resilience for Business Continuity

Read the original article: Cyber Resilience for Business Continuity “Ten years ago, you didn’t see state actors attacking [small businesses]. But it’s happening now,” warns George Anderson, product marketing director at Carbonite + Webroot, OpenText companies. Sadly, many of today’s…

What you Should Know About Chatbots and Cybersecurity

Read the original article: What you Should Know About Chatbots and Cybersecurity People’s fears and fantasies about artificial intelligence predate even computers. Before the term was coined in 1956, computing pioneer Alan Turing was already speculating about whether machines could…

Cyber News Rundown: Magecart Massive Attack

Read the original article: Cyber News Rundown: Magecart Massive Attack Magecart Launches Largest E-commerce Attack to Date Roughly 2000 e-commerce sites were compromised in the latest Magecart campaign targeting an out-of-date version of Magento software. It’s believed an additional 95,000…

Cybersecurity Tips for a Happy National Video Games Day

Read the original article: Cybersecurity Tips for a Happy National Video Games Day This year more than others, for many of us, it’s gaming that’s gotten us through. Lockdowns, uncertainty, and some pretty darn good releases have kept our computers…

4 Ways MSPs Can Fine Tune Their Cybersecurity Go-To-Market Strategy

Read the original article: 4 Ways MSPs Can Fine Tune Their Cybersecurity Go-To-Market Strategy Today’s work-from-home environment has created an abundance of opportunities for offering new cybersecurity services in addition to your existing business. With cyberattacks increasing in frequency and…

Ransomware: The Bread and Butter of Cybercriminals

Read the original article: Ransomware: The Bread and Butter of Cybercriminals Substitute your digital space for your home and encryption for the safe and you have what’s known as ransomware. Ransomware is a type of malware. After the initial infection,…

Cyber News Rundown: Android Giveaway Fraud

Read the original article: Cyber News Rundown: Android Giveaway Fraud Thousands of Android Users fall Victim to Giveaway Fraud Upwards of 65,000 Android users were potentially compromised after installing a malicious app promising free giveaways. Over the year the scam…

Cyber News Rundown: Ransomware Targets Major Cruise Line

Read the original article: Cyber News Rundown: Ransomware Targets Major Cruise Line Ransomware Attack Targets Major Cruise Line Officials for Carnival Cruises have confirmed that a portion of their IT systems were encrypted following a cyberattack identified over the weekend.…

Cyber News Rundown: Ransomware Strikes Colorado Town

Read the original article: Cyber News Rundown: Ransomware Strikes Colorado Town Colorado Town Suffers Ransomware Attack The town of Lafayette, Colorado, fell victim to a ransomware attack last week without the capability to recover from the attack without paying a…

Company Culture and Cyber Resilience by the Numbers

Read the original article: Company Culture and Cyber Resilience by the Numbers There’s no doubt we’ve all had to change our work habits as a result of the global coronavirus pandemic. Companies have had to adapt rapidly to smooth the…

Cyber News Rundown: Twitter Hack Arrests

Read the original article: Cyber News Rundown: Twitter Hack Arrests Multiple Individuals Charged for Twitter Hack Three people were charged with last month’s Twitter hack, which generated over $100,000 in bitcoin by hijacking high-profile accounts. Of the 130 accounts used…

Hack, Crash, Storm, Spill: Pick Your Poison

Read the original article: Hack, Crash, Storm, Spill: Pick Your Poison Don’t expect cybercriminals to go easy during a hurricane. Quite the opposite, in fact. Just like they’ve used the coronavirus pandemic to launch COVID-related malware scams, hackers will capitalize…

Hack, Crash, Storm, Spill: Pick Your Poison

Read the original article: Hack, Crash, Storm, Spill: Pick Your Poison Don’t expect cybercriminals to go easy during a hurricane. Quite the opposite, in fact. Just like they’ve used the coronavirus pandemic to launch COVID-related malware scams, hackers will capitalize…

Cyber News Rundown: WasteLocker Ransomware

Read the original article: Cyber News Rundown: WasteLocker Ransomware Garmin Hit with WastedLocker Ransomware Nearly a week after the company announced they had suffered a system outage, Garmin has finally admitted to falling victim to a ransomware attack, likely from…

Cyber News Rundown: ATM Jackpotting Attacks Rise

Read the original article: Cyber News Rundown: ATM Jackpotting Attacks Rise ATM Jackpotting Attacks on the Rise ATM manufacturer Diebold Nixdorf has identified a malicious campaign that uses proprietary software to “jackpot” the machines. The attack requires malicious actors to…

Cyber News Rundown: GoldenSpy

Read the original article: Cyber News Rundown: GoldenSpy Malware Discovered in Chinese Tax Software As part of an official Chinese tax initiative, researchers have found multiple backdoors into mandatory tax software installed on all Chinese business systems. The new malware…

Summer fitness: Let’s get digital

Read the original article: Summer fitness: Let’s get digital Summer is upon us. For some, summer is all about physical fitness. While exercise is essential to our overall well-being, we shouldn’t forget about our digital fitness, either. Just as our…

Cyber News Rundown: Ragnar Locker

Read the original article: Cyber News Rundown: Ragnar Locker Ragnar locker Attacks Portuguese Energy Producer It was recently confirmed that Energias de Portugal (EDP), one of the largest energy producers in the world, has fallen victim to the Ragnar Locker…

5 ways to reduce risky habits online

Read the original article: 5 ways to reduce risky habits online After surveying more than 10,000 people in 50 states about their cybersecurity habits, we wound up with some pretty surprising results. Like the fact that tech experts demonstrate riskier…

Why You Need More than Built-In Antivirus Protection

Read the original article: Why You Need More than Built-In Antivirus Protection Most major tech blogs have run some variation of the following headline in recent months: Is it worth paying for an antivirus solution anymore? The insinuation, of course,…

Cyber News Rundown: Knoxville Rocked by Ransomware

Read the original article: Cyber News Rundown: Knoxville Rocked by Ransomware Ransomware Knocks Out Knoxville, TN Knoxville, Tennessee officials have been working over the past week to secure systems and determine if any sensitive information was stolen after a ransomware…

Cyber News Rundown: Nintendo Accounts Breached

Read the original article: Cyber News Rundown: Nintendo Accounts Breached Nintendo Accounts Breached Stemming from a cyber-attack back in April, Nintendo has just announced that roughly 300,000 user accounts have been compromised, though most belong to systems that are now…

Cyber News Rundown: Trickbot Silently Targets Servers

Read the original article: Cyber News Rundown: Trickbot Silently Targets Servers TrickBot Silently Targets Servers Knowing that many domain controller servers are rarely shutdown or rebooted, the authors of TrickBot have made some changes to allow the infection to run…

Cyber News Rundown: Bank of America Breach Reveals PPP Info

Read the original article: Cyber News Rundown: Bank of America Breach Reveals PPP Info Bank of America Breach Reveals PPP Information After processing over 300,000 Paycheck Protection Program applications, Bank of America has revealed that a data breach occurred within…

Cyber News Rundown: Bank of America Breach Reveals PPP Info

Read the original article: Cyber News Rundown: Bank of America Breach Reveals PPP Info Bank of America Breach Reveals PPP Information After processing over 300,000 Paycheck Protection Program applications, Bank of America has revealed that a data breach occurred within…

Why Your Cyber Resilience Plan Doesn’t Include Windows 7

Read the original article: Why Your Cyber Resilience Plan Doesn’t Include Windows 7 Our 2020 Threat Report shows increasing risks for businesses and consumers still running Windows 7, which ceased updates, support and patches earlier this year. This creates security…

Why Your Cyber Resilience Plan Doesn’t Include Windows 7

Read the original article: Why Your Cyber Resilience Plan Doesn’t Include Windows 7 Our 2020 Threat Report shows increasing risks for businesses and consumers still running Windows 7, which ceased updates, support and patches earlier this year. This creates security…

Pay Attention to the Hacker Behind the Hoodie

Read the original article: Pay Attention to the Hacker Behind the Hoodie There’s a pretty common misconception among small businesses and medium-sized businesses (SMBs) that hackers only target large organizations. Unfortunately, this belief couldn’t be further from the truth. In…

Pay Attention to the Hacker Behind the Hoodie

Read the original article: Pay Attention to the Hacker Behind the Hoodie There’s a pretty common misconception among small businesses and medium-sized businesses (SMBs) that hackers only target large organizations. Unfortunately, this belief couldn’t be further from the truth. In…

Cyber News Rundown: HMRC Takes Down COVID-19 Scam Sites

Read the original article: Cyber News Rundown: HMRC Takes Down COVID-19 Scam Sites Adult Website Leaks Trove of Sensitive Data An recently discovered unsecured database belonging to the adult streaming site Cam4 was found to contain nearly 11 billion unique…

Cyber News Rundown: Hackers Aim at Oil Producers

Read the original article: Cyber News Rundown: Hackers Aim at Oil Producers As Oil Prices Drop, Hackers Take Aim at Producers With the recent crash in oil prices, and supply rapidly piling up, a new spear phishing campaign has begun…

Mental Health and Mindful Tech

Read the original article: Mental Health and Mindful Tech Anyone who has spent late nights scrolling through their social media feed or grinding on video games knows one thing is true: Technology can be a good thing, but only in…

5 Ways to Improve Business Cyber-Resilience

Read the original article: 5 Ways to Improve Business Cyber-Resilience A popular military maxim speaks to the need for redundancy and it goes like this: “Two is one and one is none.” Redundancy is also a key principle when it…

5 Ways to Improve Business Cyber-Resilience

Read the original article: 5 Ways to Improve Business Cyber-Resilience A popular military maxim speaks to the need for redundancy and it goes like this: “Two is one and one is none.” Redundancy is also a key principle when it…

Cyber News Rundown: Ransomware Hits LA Suburbs

Read the original article: Cyber News Rundown: Ransomware Hits LA Suburbs Los Angeles Suburb Hit with Ransomware Last month, the City of Torrance, California fell victim to a ransomware attack that shut down many of their internal systems and demanded…

DNS is on the Verge of a Major Overhaul

Read the original article: DNS is on the Verge of a Major Overhaul “One of the things about working in internet technology is nothing lasts forever… [Students] come to me and they say, ‘I want to do something that has…