Twitter is a Hotbed for Crypto Scam Bots

Twitter is a Hotbed for Crypto Scam Bots

The brazen theft of cryptocurrency has been an ongoing issue for years now, mostly affecting exchanges and users who fail to store their private keys securely. But what about scams purporting to be...read more The post Twitter is a Hotbed for Crypto Scam Bots appeared first on Webroot Threat Blog ... Read More
Twitter is a Hotbed for Crypto Scam Bots

Twitter is a Hotbed for Crypto Scam Bots

Reading Time: ~3 min.The brazen theft of cryptocurrency has been an ongoing issue for years now, mostly affecting exchanges and users who fail to store their private keys securely. But what about scams purporting to be giving free cryptocurrency away? It seems a little ridiculous, but there is a serious ... Read More
Tinder drift demo

Valentine’s Day Sends Mobile, Online Dating Scammers on the Prowl

In a month where match-making is in high demand, we took a look at recent trends around online dating sites using Webroot Brightcloud Threat Intelligence Platform. What did we find? Valentine’s Day sends...read more The post Valentine’s Day Sends Mobile, Online Dating Scammers on the Prowl appeared first on Webroot ... Read More
Fake Bread airdrop site asking for private keys.

Safe Deposit: How to Keep Your Cryptocurrency Secure

“How to buy Bitcoin” dominated Google how-to searches in 2017, ranking third overall. With the hype surrounding cryptocurrency at a palpably all-time high, now is a better time than ever to cover the...read more The post Safe Deposit: How to Keep Your Cryptocurrency Secure appeared first on Webroot Threat Blog ... Read More
An example of cryptojacking

New Cryptojacking Tactic may be Stealing Your CPU Power

What if cybercriminals could generate money from victims without ever delivering malware to their systems? That’s exactly what a new phenomenon called “cryptojacking” entails, and it’s been gaining momentum since CoinHive first debuted...read more The post New Cryptojacking Tactic may be Stealing Your CPU Power appeared first on Webroot Threat ... Read More
Do you live in one of the most-hacked states?

Two-Factor Authentication: Why & How You Should Use it

Conventional wisdom about passwords is shifting, as they are increasingly seen as a less-than-ideal security measure for securing digital accounts. Even the recommended rules for creating strong passwords were recently thrown out the...read more The post Two-Factor Authentication: Why & How You Should Use it appeared first on Webroot Threat ... Read More
Top 10 Nastiest Ransomware Attacks of 2017

Top 10 Nastiest Ransomware Attacks of 2017

/ / Headlines, SBN News
We’re revealing the top 10 nastiest ransomware attacks from the past year. NotPetya came in on our list as the most destructive ransomware attack of 2017, followed closely by WannaCry and Locky in...read more The post Top 10 Nastiest Ransomware Attacks of 2017 appeared first on Webroot Threat Blog ... Read More
Locky ransomware rises from the crypt with new Lukitus and Diablo variants

Locky ransomware rises from the crypt with new Lukitus and Diablo variants

/ / Threat Lab
NOTE: This blog post discusses active research by Webroot into an emerging threat. This information should be considered preliminary and will be updated as more data comes in. New variants of Locky—Diablo and...read more The post Locky ransomware rises from the crypt with new Lukitus and Diablo variants appeared first ... Read More