Top 7 Cybersecurity Predictions for 2012
By Mel Morris From Stuxnet to Sony, a number of cyberattacks emerged in 2011 that experts have predicted for quite some time. I predict 2012 will be even more pivotal, thrusting cybersecurity into the...
View ArticleReflections on mobile security
By Armando Orozco Be wary the next time you enter your passcode into your iPhone on the bus – someone could be shoulder surfing. In fact, a team of researchers from the University of North Carolina has...
View ArticleFor your eyes only (please)
By the Webroot Threat Team Have you ever had the queasy experience of sending a message to someone that you’d rather not have anyone else see, and then hoping that it won’t get passed along? A new...
View Article“Android Malware”– Thre@t Reply(video)
By Armando Orozco Are Android phones susceptible to Trojans and other viruses just like computer? How can you make sure your phone doesn’t become infected and if it does, what can you do? Webroot...
View ArticleWelcome to the team, Dancho!
Notice someone new on the Webroot Threat Blog? We’re thrilled to introduce Dancho Danchev – independent security consultant, cyber threat analyst and bad-guy chaser extraordinaire – as our new security...
View ArticleEvolution of Android Malware “The touch, the feel of being tricked into...
by Nathan Collier Android.SMS.FakeInst is a Trojan that aims to do one thing — trick users into sending premium SMS messages by pretending to be an install for an app. Here’s how the scam works: The...
View ArticleFakeAV for Android! There you are!
By Nathan Collier Every super hero has an arch nemesis. For a lot of Threat Researchers, including myself, Rogue Security Products, or better known as FakeAV, is theirs. Back in the day when I was...
View ArticleWebroot Bulletin Regarding AV-Comparatives Results
By Grayson Milbourne and Joe Jaroch If there is one thing that can be observed about the AV industry, it is that no solution is ever 100% effective at blocking malware. With this in mind, Webroot...
View ArticleBeware of Malicious Olympic 2012 Android Apps
By Joe McManus There are too many events happening at one time during the Olympics, which might tempt you to install an app for that. But be careful of what you install. Not all apps are what they...
View ArticleA New Zero-Day Vulnerability in Internet Explorer
By Brenden Vaughan A new zero-day vulnerability exploit has been identified in Microsoft’s Internet Explorer web browser versions 9 and below running on Windows XP, Vista and 7. Internet Explorer 10,...
View ArticleA look inside the SpyEye Trojan admin console
By Michael Johnson At Webroot we’ve been researching and chronicling developments with SpyEye since we first saw it in April 2010. This nasty Trojan is the successor to the Zeus Trojan, and it became...
View ArticleAwake at all hours during Cyber Security Awareness Month
By Jacques Erasmus I’ve been having trouble sleeping lately, and last night I pinpointed why. October has presented me with a perfect storm of Internet security developments: I embarked on my first few...
View ArticleOutdated Operating System? This BlackHole Exploit Kit has you in its sights
By Mike Johnson Several weeks back, I was presented with a group of snapshots from an active BlackHole Exploit Kit 1.2 Control Panel. As with other toolkits I’ve seen in the wild, this one has all the...
View ArticleWill you take Facebook’s candy?
By the Webroot Threat Team It’s a creepy treat, with a serious underlying message. The latest viral website uses a horror movie format to show you just how much the average Facebook application can...
View ArticleThis blackhole exploit kit gives you Windows Media Player and a whole lot more
By Mike Johnson As a follow-up to the Blackhole Exploit posting, I thought I would share one aspect of my job that I truely enjoy: Discovery. While investigating some active urls being served up via a...
View ArticleIn space, no one can hear you hack
By the Webroot Threat Team Two of NASA’s satellites were hacked during 2007 and 2008, according to a draft report to be officially released later this month. According to the United States-China...
View Article