Cerber Ransomware: The Facts

July 22, 2016By Tyler Moffitt

Cerber is yet another newer ransomware that has been gaining some traction over the past couple months, so we’re providing a breakdown of this new variant. First, here is how it looks: Unlike some other…read more

CryptoMix Ransomware: What You Should Know

July 22, 2016By Tyler Moffitt

CrytpoMix has been gaining some traction over the past few months, so it’s a good idea that we provide a rundown of this variant in the ransomware family. This is ‘barebones ransomware’, so victims aren’t presented…read more

What is Anti-Virus Software?

July 20, 2016By Blog Staff

Anti-virus software is a program or set of programs that are designed to prevent, search for, detect, and remove viruses, and other forms of malware such as worms, trojans, adware, and more. As our…read more

Computer Hackers and Predators

July 19, 2016By Blog Staff

How are they a security threat? People, not computers, create computer threats. Computer predators victimize others for their own gain. Give them access to the internet — and to your PC — and the…read more

Threat Recap: Week of July 11th

July 15, 2016By Connor Madsen

HSBC Sites Downed Briefly After Cyber Attack Earlier this week, it was reported that HSBC had been the victim of a cyber attack and both it’s US and UK sites had been taken…read more

Computer Virus 101

July 5, 2016By Blog Staff

What is a computer virus? Think of a biological virus – the kind that makes you sick. It’s persistently nasty, keeps you from functioning normally and often requires something powerful to get rid…read more

What is Social Engineering?

July 5, 2016By Blog Staff

Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted, the criminals are usually…read more

Threat Recap: Week of June 27th

July 1, 2016By Connor Madsen

There’s a lot that happens in the security world, with many stories getting lost in the mix. In an effort to keep our readers informed and updated, we present the Webroot Threat Recap, highlighting 5…read more