Pressebereich

In the News!

June 2014

06.26.14 Bank Info Security │ Improving Cyberthreat Communication
A common framework for communicating threats and alerts among security vendors' systems would bolster efforts to protect consumers' information, says David Duncan of Webroot. "Communicating threats and alerts across disparate devices that are used in the security infrastructure to help build a better, consistent understanding of these new [threats] we're encountering that are behavioral based ... is very critical," he says.

Mehr erfahren Öffnen

06.24.14 MSP Mentor │ Webroot's BrightCloud Security Services: Here's What MSPs Need to Know
Webroot, a cloud security software-as-a-service (SaaS) provider, has unveiled new enterprise-class threat intelligence services. The new BrightCloud Security Services for Enterprise are designed to provide threat intelligence through integration with popular network security and management platforms, according to the company.

Mehr erfahren Öffnen

06.23.14 IT World │ Endpoint security demands organizational changes
Wow, it's no wonder why some have declared that endpoint security software is "dead." Negative opinions like these have put leading security firms like Kaspersky, McAfee, Sophos, Symantec, Trend Micro, and Webroot on the defensive and opened the door for endpoint antimalware upstarts like Bromium, Cisco/Sourcefire, Cylance, Crowdstrike, IBM, Invincea, Malwarebytes, and Triumfant.

Mehr erfahren Öffnen

06.05.14 PC Magazine │ A Year of Snowden Revelations: What Has Changed?
The pace of revelations has slowed over the past couple months, but no one thinks we are done. "While the initial shock has diminished, the fundamental trust between businesses and their customers has certainly been challenged by the allegations of cooperation between government agencies and some very well-known technology companies," said Dick Williams, CEO of Webroot.

Mehr erfahren Öffnen

06.04.14 Techday │ Webroot: Evolutions in endpoint security
The threat landscape has been rapidly evolving over the past few years, largely driven by an expansive and mature cybercrime-as-a-service (CaaS) ecosystem. Services range from rapid trojan development, access to infected PCs and C&C hosting, all the way to the liquidation of stolen information.

Mehr erfahren Öffnen

06.02.14 MSPMentor │ Webroot Announces New ConnectWise, LabTech Software Integrations
Webroot, an Internet threat protection provider, today announced new integrations with ConnectWise's professional services automation (PSA) software and LabTech Software's remote monitoring and management (RMM) platform. Webroot's BrightCloud security intelligence platform and SecureAnywhere products provide real-time Internet threat detection for businesses, consumers and enterprises.

Mehr erfahren Öffnen

May 2014

05.21.14 USA Today │ Experts: Consumers have to protect themselves online
Every day brings another story about a sophisticated computer hacking operation. Wednesday it was eBay announcing a database of user passwords had been breached. "Hackers today are not just two guys in a dorm room who are trying to goof on you. They're well-funded, well-organized criminal organizations whose intent is financial gain," said Michael Malloy.

Mehr erfahren Öffnen

05.21.14 CIO │ BYOD Widening Employee-Employer Trust Gap, Survey Finds
If your employer told you to install a security app on your personal smartphone or tablet, would you? This question was posed to more than 2,000 employees in the United States, as part of a Webroot-commissioned Harris Interactive survey.

Mehr erfahren Öffnen

05.21.14 USA Today │ Experts: Consumers have to protect themselves online
Every day brings another story about a sophisticated computer hacking operation. Wednesday it was eBay announcing a database of user passwords had been breached. "Hackers today are not just two guys in a dorm room who are trying to goof on you. They're well-funded, well-organized criminal organizations whose intent is financial gain," said Michael Malloy.

Mehr erfahren Öffnen

05.21.14 TechRepublic │ Months later, Ebay discloses personal details breach
Ebay disclosed overnight that it has suffered an attack earlier in the year that compromised customer's names, encrypted password, email address, physical address, phone number, and date of birth. "Although Ebay is still assessing the damage, the concern is the time between the breach and its public disclosure, possibly leaving users vulnerable for weeks," said Mike Malloy.

Mehr erfahren Öffnen

05.20.14 Fox News │ How to protect your computer form viruses and hackers
Among the top antivirus software include Symantec's Norton Antivirus, McAfee, Kaspersky, Webroot and more. Like with the firewall software mentioned earlier, you might want to check on the most highly-rated program ahead of time.

Mehr erfahren Öffnen

05.20.14 Fierce Mobile IT │ BYOD Bill of Rights aims to close perceptions gap
A growing number of organizations are adopting, or at least condoning, bring-your-own-device practices, but there appears to be a growing disconnect between what employers want and what employees expect. The study looked at how employers and employees each view the elements and restrictions of a BYOD program.

Mehr erfahren Öffnen

05.19.14 PC Magazine │ Mobile Malware Not The Only Threat; Unwanted Apps Bad, Too
When it comes to mobile threats, most people can tell when an app is doing something bad. But a whole class of potentially unwanted applications-PUAs-are a little harder to figure out. They aren't malware, but they aren't harmless, either. Webroot researchers recently provided Security Watch with some insights on the types of apps available on Google Play.

Mehr erfahren Öffnen

05.06.14 Mobile Enterprise │ Attack of the Apps
Over the course of 10 years, Grayson Milbourne has watched the evolution of cyber threats move from the PC environment to the hands of near billions of mobile users. The director of security intelligence for Webroot says, "This is largely driven by user behavior-we are using our mobile devices much more than our traditional desktop environments. That's definitely noticed by the cybercrime community and it follows the user activity."

Mehr erfahren Öffnen

05.02.14 CNBC │ The anatomy of an Android smartphone cyberattack
Android's distribution network also is more complex. "Google has done a lot to address the distribution of updates by removing device manufacturers' and carriers' play into the distribution of updates," said Grayson Milbourne.

Mehr erfahren Öffnen

Januar 2014

01.08.14 Virtual Strategy Magazine │ Executive Viewpoint 2014 Prediction: TeleSign and Webroot
Developers are becoming more aware of secure app development practices and risky app behaviors to avoid. That said, some app developers will continue to seek new ways to generate revenue from building apps that may intrude on privacy.

Mehr erfahren Öffnen

01.03.14 PC Magazine│ 2014 Tech Predictions
Dick Williams, President and CEO of Webroot - In 2014 all of these smart devices, limitless social networks, and personal acquiescence will be used to an extra-ordinary extent to mine behaviors and identity with the aim of refining cyberattacks, cybercrime and cyber-espionage. As a result there will be some very high-profile compromises of individual, corporate and government data that will make Edward Snowden and the NSA seem benign in comparison. That will produce a privacy backlash that will spawn a host of new security services.

Mehr erfahren Öffnen

In the News