Integration Holds the Keys to the Castle

March 6, 2017By Ashley Stewart

Talks of integration are often met with audible sighs of displeasure. It’s a lot of work. You have to combine various platforms, software, and the list goes on. At Webroot, we decided to…read more

Why 2015 will be the year of cloud attacks

January 9, 2015By Mike Malloy

Several cyber take downs occurred this year when hackers infiltrated Home Depot, Michaels, iCloud, JP Morgan and the list just goes on. And while consumers and companies have been hit hard in 2014,…read more

Successful Launch of Webroot for Gamer at E3

June 17, 2014By Mike Rush

Webroot, the market leader in cloud-based, real-time Internet threat detection, recently returned from the 18th annual Electronic Entertainment Expo, or E3 for short, hosted by the Entertainment Software Association.  Used by many of…read more

Mobile Security 2014: Predictions

December 13, 2013By Cameron Palan

The most recent and interesting threats we see are more or less “evolved” forms of previous threats, including those originating from the PC side. People have been “spoofing” parts of apps, such as…read more

Subscription Renewal Spam Points to Drive-by

August 6, 2010By Blog Staff

Dear Customers: Please be aware that a crew of Russian malware distributors are circulating a spam message which looks like a subscription renewal confirmation from Best Buy, allegedly for one of our products….read more

Introducing the Threat Blog

March 23, 2009By Blog Staff

Welcome, readers. I’m a member of the Threat Research team at Webroot, and I’ve been asked to contribute to Webroot’s new Threat Blog. I’d like to take a moment to introduce myself, tell…read more