Posts Tagged: Black Hat


ThreatVlog Episode 2: Keyloggers and your privacy

by

Commercial and black hat keyloggers can infect any device, from your PC at home to the phone in your hand.  What exactly are these programs trying to steal?  How can this data be used harmfully against you?  And what can you do to protect all your data and devices from this malicious data gathering?  In this episode of Webroot ThreatVlog, Grayson Milbourne talks about security, your data, and protecting yourself. [youtube=http://youtu.be/BvBybxTCicU] Did you miss the first episode?  Be sure to check it out here:  http://blog.webroot.com/2013/08/20/tor-and-apple-exploits-revealed/

Continue Reading »

Black Hat Redux: Botnet Takedown Mistakes to Avoid

by

I’ve worked in the security industry for nearly five years, and it was apparent early on that the most successful people in this field bring to their work a passion and a commitment to protecting not only one’s customers, but to providing a certain level of information about security threats to the world at-large, so even your non-customers can help or protect themselves. It can be hard to know where to stop once you get on a roll. Malware infections frequently lead to unexplored, interesting backwaters on the Internet. And, sometimes, those backwaters are where the criminals run those operations. […]

Continue Reading »