Threat Research

It’s what we do.

Five Summer Travel Security Tips

June 24, 2011By Andrew Brandt

Ah, summer. Beaches, drinks with little umbrellas, 4th of July fireworks, baseball games, reading long cheesy novels in a lounge chair, teleconferencing with colleagues from your hotel room in Aruba. Wait, what? Yes,…read more

Why Put Security Into the Cloud?

June 7, 2011By glhaldeman

This week, Webroot’s Thre@t Reply managed to steal some time with Ian Moyse, who knows a thing or two about the benefits of putting your computer and network security into the cloud, out…read more

MacProtector: Rogue of the Week

May 27, 2011By Andrew Brandt

This week, we turn our attention temporarily away from the never-ending stream of rogue security products on the Windows platform and take a closer look at the Mac OS analogue, MacProtector (aka Mac…read more

Thre@t Reply: What’s a Firewall?

May 24, 2011By Armando Orozco

This week’s Thre@t Reply video features Threat Research Analyst Armando Orozco answering one of the most frequently asked questions we receive: What is a firewall, and how does it work? Well, the actual…read more

Rogue of the Week: Windows Recovery

May 19, 2011By Andrew Brandt

Word from the AMR group last week was that there weren’t many changes from the previous week; Many of the same rogue antivirus previously reported in this blog continue to plague the Internet….read more

Chinese Android Trojan Texts Premium Numbers

May 11, 2011By Armando Orozco

By Andrew Brandt and Armando Orozco A Trojaned application that displays a cutesy image of a 2011 calendar on an Android device’s desktop comes with a nasty surprise: The app sends text messages…read more