Tech Support Scams: From Bad to Worse

Tech Support Scams: From Bad to Worse

Reading Time: ~2 min.Fake tech support scams aren’t going anywhere. In fact, recent data shows this type of social engineering attack is on the rise—with phony tech support calls, emails, and pop-ups peddling the digital equivalent of snake oil to unsuspecting internet users around the world. While many people have ... Read More
Five ways free antivirus could cost you

3 Pitfalls Facing Privacy in 2018

Earlier this month, CES attendees got a taste of the future with dazzling displays of toy robots, smart assistants, and various AI/VR/8K gadgetry. But amid all the remarkable tech innovations on the horizon,...read more The post 3 Pitfalls Facing Privacy in 2018 appeared first on Webroot Threat Blog ... Read More
Keeping up with phishing attacks | Webroot Real-Time Anti-Phishing

Just Keep Swimming: How to Avoid Phishing on Social Media

From Facebook to LinkedIn, social media is flat-out rife with phishing attacks. You’ve probably encountered one before… Do fake Oakley sunglasses sales ring a bell? Phishing attacks attempt to steal your most private...read more The post Just Keep Swimming: How to Avoid Phishing on Social Media appeared first on Webroot ... Read More
Do you live in one of the most-hacked states?

Public Safety in a Connected World

The U.S. electrical grid is in “imminent danger” from cyberattacks according to a report from the U.S. Energy Department released earlier this year. Such an attack would put much of the infrastructure that...read more The post Public Safety in a Connected World appeared first on Webroot Threat Blog ... Read More
Raising Cyber Savvy Kids

Raising Cyber Savvy Kids

| | Cybersecurity Tips
Over the last year, a handful of cyberattacks have made news headlines and affected families. High-tech toy maker Spiral Toys was the victim of a particularly cunning hacking scheme. The maker of CloudPets...read more The post Raising Cyber Savvy Kids appeared first on Webroot Threat Blog ... Read More
What do you do to protect your privacy?

Fending Off Privacy Invasion

Internet users in the U.S. have seen internet privacy protections diminish significantly in the post-9/11 era. In just March of this year, Congress swiftly (and quietly) did away with federal privacy regulations that...read more The post Fending Off Privacy Invasion appeared first on Webroot Threat Blog ... Read More
Decoding DEF CON 25

Decoding DEF CON 25

DEF CON 25 has come and gone, but the cybersecurity world is still reeling from some of the research and advanced threats demonstrated at this annual convention of the world’s foremost hackers. Security...read more The post Decoding DEF CON 25 appeared first on Webroot Threat Blog ... Read More
What We Learned at Black Hat 2017

What We Learned at Black Hat 2017

Last week, Black Hat USA 2017 brought an impressive 15,000+ cybersecurity professionals to Las Vegas to talk shop about the biggest issues facing businesses today. Here’s a recap from the perspective of the...read more The post What We Learned at Black Hat 2017 appeared first on Webroot Threat Blog ... Read More