Top 7 Cybersecurity Predictions for 2012
By Mel Morris From Stuxnet to Sony, a number of cyberattacks emerged in 2011 that experts have predicted for quite some time. I predict 2012 will be even more pivotal, thrusting cybersecurity into the...
View ArticleFor your eyes only (please)
By the Webroot Threat Team Have you ever had the queasy experience of sending a message to someone that you’d rather not have anyone else see, and then hoping that it won’t get passed along? A new...
View ArticleWelcome to the team, Dancho!
Notice someone new on the Webroot Threat Blog? We’re thrilled to introduce Dancho Danchev – independent security consultant, cyber threat analyst and bad-guy chaser extraordinaire – as our new security...
View ArticleBeware of Malicious Olympic 2012 Android Apps
By Joe McManus There are too many events happening at one time during the Olympics, which might tempt you to install an app for that. But be careful of what you install. Not all apps are what they...
View ArticleA look inside the SpyEye Trojan admin console
By Michael Johnson At Webroot we’ve been researching and chronicling developments with SpyEye since we first saw it in April 2010. This nasty Trojan is the successor to the Zeus Trojan, and it became...
View ArticleAwake at all hours during Cyber Security Awareness Month
By Jacques Erasmus I’ve been having trouble sleeping lately, and last night I pinpointed why. October has presented me with a perfect storm of Internet security developments: I embarked on my first few...
View ArticleOutdated Operating System? This BlackHole Exploit Kit has you in its sights
By Mike Johnson Several weeks back, I was presented with a group of snapshots from an active BlackHole Exploit Kit 1.2 Control Panel. As with other toolkits I’ve seen in the wild, this one has all the...
View ArticleWill you take Facebook’s candy?
By the Webroot Threat Team It’s a creepy treat, with a serious underlying message. The latest viral website uses a horror movie format to show you just how much the average Facebook application can...
View ArticleThis blackhole exploit kit gives you Windows Media Player and a whole lot more
By Mike Johnson As a follow-up to the Blackhole Exploit posting, I thought I would share one aspect of my job that I truely enjoy: Discovery. While investigating some active urls being served up via a...
View ArticleIn space, no one can hear you hack
By the Webroot Threat Team Two of NASA’s satellites were hacked during 2007 and 2008, according to a draft report to be officially released later this month. According to the United States-China...
View Article