HackDig : Dig high-quality web security articles for hackers

Personal Security: Why you Should Update your OS & Internet Browser TODAY

  If you’re one of the people who is still stubbornly holding onto Windows XP (which stopped receiving support and security updates as of April 8, 2014), it’s time to let go. Likewise, if you’re using an outdated version of your preferred internet browser, it’s time to update. Right now. Why? In both scenarios, you’re putti
Publish At:2016-03-18 01:50 | Read:7284 | Comments:0 | Tags:Thought Leadership browser security Browser Update Chrome Fi

Helping Organisations Stay Secure In An Unsecure Age

  Seemingly every day, we’re reminded that companies need to work harder to stay secure during a time where cybercrime is rampant and many organizations remain vulnerable to attack.  I’ve recently been speaking to the press about what can and should be done to mitigate these risks. I hope the following questions and answers will help shed so
Publish At:2016-03-09 00:20 | Read:2864 | Comments:0 | Tags:Thought Leadership Business security CIO CISO cybercrime Sec

Webroot Supports Open Network Insight Project

  On Monday of this week, Webroot joined Cloudera, the leading provider of modern data management and analytics systems built on Apache Hadoop, in announcing Open Network Insight (ONI) Project, a database and tools designed specifically for cyber security incident response. ONI will enable security analysts and responders to manipulate the massive amoun
Publish At:2016-03-05 05:55 | Read:6308 | Comments:0 | Tags:Thought Leadership Cloudera ONI Open Network insight open so

Building a secure IoT Gateway using Threat Intelligence

Parts 1 and 2 of this series provided an overview of Threat Intelligence and hopefully offered some understanding as to what role it can play in helping secure an IoT infrastructure. For those familiar with cyber security and how to implement Threat Intelligence in traditional network appliances the jump to securing an IoT Gateway is fairly straight forward.
Publish At:2016-02-19 04:15 | Read:3092 | Comments:0 | Tags:Thought Leadership

What IP/URL Based Threat Intelligence Can and Can’t do for the IoT

Part one of this series provided a high-level overview of Threat Intelligence, the underlying data types common in the current security landscape and how these data are gathered, analyzed and consumed. As cyber security becomes a key focus for the IoT it may appear, on the surface, much of the existing threat intelligence and the techniques used to gather th
Publish At:2016-02-11 15:20 | Read:2789 | Comments:0 | Tags:Thought Leadership IoT

Some notes on VirusTotal.

Many of you are probably familiar with VirusTotal, a service that allows you to scan a file or URL using multiple antivirus and URL scanners. VirusTotal results are often used in write-ups about new malware to show how widely a sample is detected by the AV community. We receive links to VirusTotal results via our support system and on the Webroot Community.
Publish At:2016-02-10 21:15 | Read:3677 | Comments:0 | Tags:Thought Leadership Virus

Threat Intelligence: An Overview

Bring Threat Intelligence to the world of IoT Threat Intelligence has become common throughout the cyber security landscape used in traditional information technology platforms from next generation firewalls, application load balancers, SIEM and other threat monitoring and prevention tools. With the pervasive growth of IoT initiatives and concerns around how
Publish At:2016-02-04 20:35 | Read:3333 | Comments:0 | Tags:Thought Leadership Data analysis IoT Threat Intelligence

Top Browser Plugins to Increase Browsing Security and Privacy

Here at Webroot, we take security seriously. With that being said, there is always more that you can do to improve your security and privacy while browsing online. Below is a list of browser plugins that we recommend you check out. Webroot Filtering Extension This one is pretty much a given as we are Webroot. Our filtering extension provides you with the rep
Publish At:2016-02-04 02:30 | Read:4212 | Comments:0 | Tags:Thought Leadership

Worst Passwords of 2015, Best Passwords of 2016

When it comes to digital security, little is as important as knowing how to create a strong password. An ideal password is easy enough to remember so that it doesn’t need to be written down, yet complex enough to prevent someone else from guessing it. For many, this is a challenging and even frustrating experience, a delicate balancing act. However, th
Publish At:2016-01-28 07:45 | Read:3446 | Comments:0 | Tags:Thought Leadership

Crypto-ransomware – still a real worry

This week, we held our first BrightTALK webinar of 2016 (January 19th), talking about crypto-ransomware. I’ve got to admit I’m always overwhelmed at the numbers of people interested in this as a topic, and I called in help from one of our top threat researchers Tyler Moffitt to help me out with answering the more technical questions. In fact, Tyler and I dou
Publish At:2016-01-22 07:05 | Read:3547 | Comments:0 | Tags:Thought Leadership

Cleaning up your Mac

In support of January being Clean Up Your Computer Month and National Privacy Day on January 28th, here are some great tips to start 2016 off right. Let’s face it, we are all guilty of letting our computers get out of hand from time to time. I, for one, realized this when cleaning up one of my hard drives and discovered that I had 363 games either installed
Publish At:2016-01-07 23:30 | Read:4409 | Comments:0 | Tags:Thought Leadership

Top Security Predictions for 2016

As 2015 comes to an end, we all look back at the huge list of big-name data breaches that occured, from passwords revealed to full on dating identities. It was not a pretty year for companies with lacking security protocols to say the least. And while we can sit here and delve into what happened, as a security company we must continue looking forward to what
Publish At:2015-12-30 16:35 | Read:3773 | Comments:0 | Tags:Thought Leadership

Top 11 Security resolutions for the New Year

2015 has been the worst year so far for security breaches.  Although the state of online security reminds me of that scene in Office Space where Peter says that every day you see him is the worst day of his life, there’s a few things you can do to protect yourself against getting your data and online identity stolen.  If you’re looking for a New Year’s resol
Publish At:2015-12-29 22:30 | Read:4943 | Comments:0 | Tags:Thought Leadership

Black Friday & Cyber Monday Security Tips

With the two most hectic shopping days of the year rapidly approaching, you may be preparing to nab a deal… but identity thieves are just as busy trying to nab your financial information. While you’re out looking for the best deals online and in retail shops on Black Friday and Cyber Monday, keep these security tips in mind to protect your identi
Publish At:2015-11-26 00:45 | Read:4530 | Comments:0 | Tags:Thought Leadership Black Friday Cyber Monday security

FBI says to just pay the ransom

We all know cryptolocker and we all know the toll it’s taken on many individuals and companies. While the original cryptolocker has been shut down since FBI operation Tovar it has not stalled the many variants of encrypting ransomware from becoming a plague to the user (looking at you cryptowall). The “business model” just isn’t going
Publish At:2015-10-30 17:45 | Read:3956 | Comments:0 | Tags:Thought Leadership encrypting ransomware FBI

Tools

Tag Cloud