Quantcast
Channel: Webroot Threat Blog » glhaldeman
Browsing all 16 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Top 7 Cybersecurity Predictions for 2012

By Mel Morris From Stuxnet to Sony, a number of cyberattacks emerged in 2011 that experts have predicted for quite some time. I predict 2012 will be even more pivotal, thrusting cybersecurity into the...

View Article


Image may be NSFW.
Clik here to view.

Reflections on mobile security

By Armando Orozco Be wary the next time you enter your passcode into your iPhone on the bus – someone could be shoulder surfing. In fact, a team of researchers from the University of North Carolina has...

View Article


Image may be NSFW.
Clik here to view.

For your eyes only (please)

By the Webroot Threat Team Have you ever had the queasy experience of sending a message to someone that you’d rather not have anyone else see, and then hoping that it won’t get passed along? A new...

View Article

Image may be NSFW.
Clik here to view.

“Android Malware”– Thre@t Reply(video)

By Armando Orozco Are Android phones susceptible to Trojans and other viruses just like computer? How can you make sure your phone doesn’t become infected and if it does, what can you do? Webroot...

View Article

Image may be NSFW.
Clik here to view.

Welcome to the team, Dancho!

Notice someone new on the Webroot Threat Blog? We’re thrilled to introduce Dancho Danchev – independent security consultant, cyber threat analyst and bad-guy chaser extraordinaire – as our new security...

View Article


Image may be NSFW.
Clik here to view.

Evolution of Android Malware “The touch, the feel of being tricked into...

by Nathan Collier Android.SMS.FakeInst is a Trojan that aims to do one thing — trick users into sending premium SMS messages by pretending to be an install for an app.  Here’s how the scam works: The...

View Article

Image may be NSFW.
Clik here to view.

FakeAV for Android! There you are!

By Nathan Collier Every super hero has an arch nemesis. For a lot of Threat Researchers, including myself, Rogue Security Products, or better known as FakeAV, is theirs. Back in the day when I was...

View Article

Image may be NSFW.
Clik here to view.

Webroot Bulletin Regarding AV-Comparatives Results

By Grayson Milbourne and Joe Jaroch If there is one thing that can be observed about the AV industry, it is that no solution is ever 100% effective at blocking malware. With this in mind, Webroot...

View Article


Image may be NSFW.
Clik here to view.

Beware of Malicious Olympic 2012 Android Apps

By Joe McManus There are too many events happening at one time during the Olympics, which might tempt you to install an app for that. But be careful of what you install. Not all apps are what they...

View Article


Image may be NSFW.
Clik here to view.

A New Zero-Day Vulnerability in Internet Explorer

By Brenden Vaughan A new zero-day vulnerability exploit has been identified in Microsoft’s Internet Explorer web browser versions 9 and below running on Windows XP, Vista and 7. Internet Explorer 10,...

View Article

Image may be NSFW.
Clik here to view.

A look inside the SpyEye Trojan admin console

By Michael Johnson At Webroot we’ve been researching and chronicling developments with SpyEye since we first saw it in April 2010. This nasty Trojan is the successor to the Zeus Trojan, and it became...

View Article

Image may be NSFW.
Clik here to view.

Awake at all hours during Cyber Security Awareness Month

By Jacques Erasmus I’ve been having trouble sleeping lately, and last night I pinpointed why. October has presented me with a perfect storm of Internet security developments: I embarked on my first few...

View Article

Image may be NSFW.
Clik here to view.

Outdated Operating System? This BlackHole Exploit Kit has you in its sights

By Mike Johnson Several weeks back, I was presented with a group of snapshots from an active BlackHole Exploit Kit 1.2 Control Panel. As with other toolkits I’ve seen in the wild, this one has all the...

View Article


Image may be NSFW.
Clik here to view.

Will you take Facebook’s candy?

By the Webroot Threat Team It’s a creepy treat, with a serious underlying message. The latest viral website uses a horror movie format to show you just how much the average Facebook application can...

View Article

Image may be NSFW.
Clik here to view.

This blackhole exploit kit gives you Windows Media Player and a whole lot more

By Mike Johnson As a follow-up to the Blackhole Exploit posting, I thought I would share one aspect of my job that I truely enjoy: Discovery. While investigating some active urls being served up via a...

View Article


Image may be NSFW.
Clik here to view.

In space, no one can hear you hack

By the Webroot Threat Team Two of NASA’s satellites were hacked during 2007 and 2008, according to a draft report to be officially released later this month. According to the United States-China...

View Article
Browsing all 16 articles
Browse latest View live