New DIY email harvester released in the wild

April 16, 2012By Dancho Danchev

In order for cybercriminals to launch, spam, phishing and targeted attacks, they would first have to obtain access to a “touch point”, in this case, your valid email address, IM screen name, or…read more

How phishers launch phishing attacks

January 23, 2012By Dancho Danchev

Just like in every other industry, participants in the cybercrime ecosystem are no strangers to the concept of standardization. Standardization results in efficiencies, which on the other hand results in economies of scale. In…read more

Thre@t Reply: “Online Shopping” | Part 2 of 2

May 9, 2011By Grayson Milbourne

In the second of a two-part series with Threat Research Analyst Grayson Milbourne, we answer a question about how to stay safe when shopping online. In the previous video, Grayson discussed how to identify…read more

Webroot Answers Your Security Questions

April 5, 2011By Andrew Brandt

I’m very pleased to present today the first in a series of videos we’ve produced. The videos have the lofty goal of addressing the most pressing questions relating to malware, cybercrime, and online…read more

Fishing for Phishers is a Full-Time Job

February 23, 2011By glhaldeman

By Ian Moyse, EMEA Channel Director We seem to take phishing attacks for granted these days, in much the same way that we’ve accepted spam as a natural, and inevitable, by-product of email….read more

Tips to Avoid Tax Season Scams

January 28, 2011By glhaldeman

By Jeff Horne, Director, Threat Research As tax season rolls around again in the US and UK, it seems like a good time to revisit the perils taxpayers face seemingly every year at…read more

WoW Expansion Beta Likely to Spawn Phishers, Scams

June 30, 2010By Andrew Brandt

Blizzard’s announcement today that they will begin a closed beta-test for the latest expansion pack is likely to generate a lot of excitement among that particularly low breed of online criminals who steal…read more

true