![Fake Security Scams – 2015 Edition](https://blog-en.webroot.com/wp-content/uploads/2014/12/communnity-blog-default-images-breach.png)
![Blog Staff](https://blog-en.webroot.com/wp-content/uploads/2018/08/24142610/Blog-Staff_avatar_1506092225-96x96.jpg)
![Fake Security Scams – 2015 Edition](https://blog-en.webroot.com/wp-content/uploads/2014/12/communnity-blog-default-images-breach.png)
![Webroot at RSA Conference 2015](https://blog-en.webroot.com/wp-content/uploads/2015/04/RSA.jpg)
Webroot at RSA Conference 2015
Reading Time: ~ 2 min.![Mobile World Congress 2015 – The Big Launches](https://blog-en.webroot.com/wp-content/uploads/2015/03/Mobile-World-Congress-MWC-Preview.jpg)
Mobile World Congress 2015 – The Big Launches
Reading Time: ~ 2 min.![Lenovo Support Page Hacked](https://blog-en.webroot.com/wp-content/uploads/2015/02/LENOVO_HACKED.png)
Lenovo Support Page Hacked
Reading Time: ~ 2 min.![Five Questions The Financial Industry Should Be Asking About Security](https://blog-en.webroot.com/wp-content/uploads/2014/12/communnity-blog-default-images-leadership.png)
Five Questions The Financial Industry Should Be Asking About Security
Reading Time: ~ 2 min.![Did Blackhat just break the hacker movie stereotype?](https://blog-en.webroot.com/wp-content/uploads/2015/01/Blackhat-movie-2015.jpg)
Did Blackhat just break the hacker movie stereotype?
Reading Time: ~ 2 min.![Hacking in Hollywood](https://blog-en.webroot.com/wp-content/uploads/2015/01/2vnrkw8.png)
Hacking in Hollywood
Reading Time: ~ 3 min.![Breach Therapy: 10 Companies Who Can’t Wait For 2014 To Be Over](https://blog-en.webroot.com/wp-content/uploads/2014/12/communnity-blog-default-images-breach.png)
Breach Therapy: 10 Companies Who Can’t Wait For 2014 To Be Over
Reading Time: ~ 5 min.![Safe Online Shopping, Happy Online Shopping – 5 Security Tips for the Holiday Season](https://blog-en.webroot.com/wp-content/uploads/2014/11/AI89wlP.png)
Safe Online Shopping, Happy Online Shopping – 5 Security Tips for the Holiday Season
Reading Time: ~ 5 min.![What To Know About Apple and WireLurker](https://blog-en.webroot.com/wp-content/uploads/2014/12/communnity-blog-default-images-malware.png)
What To Know About Apple and WireLurker
Reading Time: ~ 3 min.![Son of a Breach! Can Companies Just Safeguard Their Customers’ Data?](https://blog-en.webroot.com/wp-content/uploads/2014/12/communnity-blog-default-images-leadership.png)
Son of a Breach! Can Companies Just Safeguard Their Customers’ Data?
Reading Time: ~ 5 min.![‘Bash’ Shellshocks the Internet – Here’s What You Should Know](https://blog-en.webroot.com/wp-content/uploads/2014/12/communnity-blog-default-images-threatresearch.png)