Solving the mystery of incidence response

March 6, 2014By Grayson Milbourne

The threat landscape today is very different from a few years ago. With an increasingly creative number of threat vectors through which to launch an attack, it has never been more challenging to…read more

An update to the Target breach theory.

January 17, 2014By Richard Melick

It was brought to our attention that the research published had flaws. To read our response, please click here: https://community.webroot.com/t5/Security-Industry-News/Update-to-the-Target-breach-theory/m-p/77825

Top consumer security predictions for 2014

December 31, 2013By Tyler Moffitt

Top Predictions for 2014 FBI/ICE MoneyPak Cryptolocker Rogues As this year comes to a close we’ve seen some measurable progress on the infiltration techniques for malware. We’re going to give you some insight…read more

Cybercrime Trends 2013 – Year in Review

December 27, 2013By Dancho Danchev

It’s that time of the year! The moment when we reflect back on the cybercrime tactics, techniques and procedures (TTPs) that shaped 2013, in order to constructively speculate on what’s to come for…read more

Top 5 Enterprise Threat Predictions for 2014

December 18, 2013By Grayson Milbourne

Top 5 Enterprise Threat Predictions for 2014 Ransomware for the enterprise Compromised clouds Advanced mobile phishing tactics APT’s focus on mobile Mobile device linked to major compromise When thinking about cyber-security and looking…read more