Category: Webroot Blog

DNS is on the Verge of a Major Overhaul

Read the original article: DNS is on the Verge of a Major Overhaul “One of the things about working in internet technology is nothing lasts forever… [Students] come to me and they say, ‘I want to do something that has…

Cyber News Rundown: Ransomware Wrecks Florida City

Read the original article: Cyber News Rundown: Ransomware Wrecks Florida City Florida City Sees Lasting Effects of Ransomware Attack Nearly three weeks after the City of Jupiter, Florida suffered a ransomware attack that took many of their internal systems offline,…

The Problem with HTTPS

Despite the intent of ensuring safe transit of information to and from a trusted website, encrypted protocols (usually HTTPS) do little to validate that the content of certified websites is safe. With the widespread usage of HTTPS protocols on major…

Cyber News Rundown: Malicious COVID-19 Websites Surge

Malicious COVID-19 Websites Surge In recent months, more than 136 thousand new domains have been registered that reference the current COVID-19 outbreak, many of which have yet to be flagged. A large portion of these sites are distributing phishing campaigns…

Cyber News Rundown: Zoom Targeted by Hackers

Zoom Video Software Targeted by Hackers With much of the professional world now telecommuting, hackers have taken notice and are finding vulnerabilities within Zoom’s software to hijack online meetings. Over 400 new domains have been registered through Zoom in just…

Cyber News Rundown: Zoom Targeted by Hackers

Zoom Video Software Targeted by Hackers With much of the professional world now telecommuting, hackers have taken notice and are finding vulnerabilities within Zoom’s software to hijack online meetings. Over 400 new domains have been registered through Zoom in just…

2020’s Most (and Least) Cyber-Secure States

For the past several years, Webroot and its partners have conducted a series of studies aimed at better understanding the attitudes, perspectives, and behaviors related to cyber hygiene in United States. This helps users determine which behaviors put them most…

Lost or Stolen Device? Here’s What to do Next

It’s a nightmare, it’s inconvenient, and it’s inevitable. Losing or having your smart device stolen poses a significant, looming privacy risk— we just don’t like to think about it. However, this is an instance where hiding your head in the…

Lost or Stolen Device? Here’s What to do Next

It’s a nightmare, it’s inconvenient, and it’s inevitable. Losing or having your smart device stolen poses a significant, looming privacy risk— we just don’t like to think about it. However, this is an instance where hiding your head in the…

Cyber News Rundown: WHO Under Cyberattack

World Health Organization Sees Rise in Cyberattacks Officials for the World Health Organization (WHO) have announced that many of their sites and servers have been under attack by unsuccessful hackers trying to capitalize on the latest health scare. The attack…

Hackers: Fact vs. Fiction

Have you ever watched a movie and seen a character doing something you know how to do, and thought to yourself, “jeez, that’s totally wrong. Couldn’t they have done a little research?” That’s exactly what hackers think when they watch…

Hackers: Fact vs. Fiction

Have you ever watched a movie and seen a character doing something you know how to do, and thought to yourself, “jeez, that’s totally wrong. Couldn’t they have done a little research?” That’s exactly what hackers think when they watch…

Staying Cyber Resilient During a Pandemic

We’re all thinking about it, so let’s call it out by name right away. The novel coronavirus, COVID-19, is a big deal. For many of us, the structure of our lives is changing daily; and those of us who are…

World Backup Day: A Seriously Good Idea

“Cold Cuts Day,” “National Anthem Day,” “What if Cats and Dogs had Opposable Thumbs Day”… If you’ve never heard of World Backup Day, you’d be forgiven for thinking it’s another of the gimmicky “holidays” that seem to be snatching up…

Cyber News Rundown: Paradise Ransomware

Paradise Ransomware Spreading Through Unusual Attachments While Paradise ransomware isn’t new to the scene, the latest methods it’s using to spread are a bit surprising. Though it sticks to using email for transmission, it now offers up an IQY attachment…

5 Security Tips for Setting Up a New Device

The last thing you want to do when you get a new computer, mobile device, or tablet is spend a lot of time setting it up. But like any major appliance, these devices are something you want to invest a…

Cyber News Rundown: Estée Lauder Data Exposed

Estée Lauder Leaves Massive Database Unprotected Earlier this week researchers discovered an unsecured database containing over 440 million records belonging to Estee Lauder, a major make-up manufacturer. Though the company has confirmed that no customer data was stored in that…

Cyber News Rundown: Emotet Targets Tax Season

Tax Season Brings Emotet to the Front As Americans prepare for tax season, Emotet authors have started a new campaign that imitates a W-9 tax form requested by the target. As with most malicious phishing, an attached document asks users…

Cyber News Rundown: Magecart Hackers Arrested

Indonesian Magecart Hackers Arrested At least three individuals were arrested in connection to the infamous Magecart information stealing malware. Thanks to the combined efforts of several international law enforcement agencies, numerous servers issuing commands to awaiting Magecart scripts have been…

Cyber News Rundown: Cannabis User Data Breach

Point-of-Sale Breach Targets U.S. Cannabis Industry Late last month, researchers discovered a database owned by the company THSuite that appeared to contain information belonging to roughly 30,000 cannabis customers in the U.S. With no authentication, the researchers were able to…

Cyber News Rundown: Ryuk Uses Wake-on-Lan

Ryuk Adds New Features to Increase Devastation The latest variant of the devastating Ryuk ransomware has been spotted with a new feature that allows it to turn on devices connected to the infected network. By taking advantage of Wake-on-Lan functionality,…

Cyber News Rundown: Snake Ransomware

Snake Ransomware Slithers Through Networks A new ransomware variant, dubbed “Snake,” has been found using more sophisticated obfuscation while targeting entire networks, rather than only one machine. In addition, Snake will append any encrypted file extensions with five random characters…