{"id":4189,"date":"2011-04-05T09:05:58","date_gmt":"2011-04-05T16:05:58","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=4189"},"modified":"2018-01-30T13:18:45","modified_gmt":"2018-01-30T20:18:45","slug":"webroot-answers-your-security-questions","status":"publish","type":"post","link":"https://www.webroot.com/blog/2011\/04\/05\/webroot-answers-your-security-questions\/","title":{"rendered":"Webroot Answers Your Security Questions"},"content":{"rendered":"<p class=\"getsocial\" style=\"text-align: left;\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2001.png\" \/><a title=\"Add to Facebook\" href=\"http:\/\/www.facebook.com\/sharer.php?u=http:\/\/blog.webroot.com\/2011\/04\/05\/webroot-answers-your-security-questions\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Facebook\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2011.png\" \/><\/a><a title=\"Add to Digg\" href=\"http:\/\/digg.com\/submit?phase=2&amp;url=http%3A%2F%2Fblog.webroot.com%2F2011%2F04%2F05%2Fwebroot-answers-your-security-questions&amp;title=Webroot%20Answers%20Your%20Security%20Questions\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Digg\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2021.png\" \/><\/a><a title=\"Add to Del.icio.us\" href=\"http:\/\/del.icio.us\/post?url=http%3A%2F%2Fblog.webroot.com%2F2011%2F04%2F05%2Fwebroot-answers-your-security-questions&amp;title=Webroot%20Answers%20Your%20Security%20Questions\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Del.icio.us\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2031.png\" \/><\/a><a title=\"Add to Stumbleupon\" href=\"http:\/\/www.stumbleupon.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2011%2F04%2F05%2Fwebroot-answers-your-security-questions&amp;title=Webroot%20Answers%20Your%20Security%20Questions\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Stumbleupon\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2041.png\" \/><\/a><a title=\"Add to Reddit\" href=\"http:\/\/reddit.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2011%2F04%2F05%2Fwebroot-answers-your-security-questions&amp;title=Webroot%20Answers%20Your%20Security%20Questions\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Reddit\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2051.png\" \/><\/a><a title=\"Add to Blinklist\" href=\"http:\/\/www.blinklist.com\/index.php?Action=Blink\/addblink.php&amp;Description=&amp;Url=http%3A%2F%2Fblog.webroot.com%2F2011%2F04%2F05%2Fwebroot-answers-your-security-questions&amp;Title=Webroot%20Answers%20Your%20Security%20Questions\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Blinklist\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2061.png\" \/><\/a><a title=\"Add to Twitter\" href=\"http:\/\/twitter.com\/home\/?status=Webroot%20Answers%20Your%20Security%20Questions+%40+http%3A%2F%2Fblog.webroot.com%2F2011%2F04%2F05%2Fwebroot-answers-your-security-questions\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Twitter\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2071.png\" \/><\/a><a title=\"Add to Technorati\" href=\"http:\/\/www.technorati.com\/faves?add=http:\/\/blog.webroot.com\/2011\/04\/05\/webroot-answers-your-security-questions\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Technorati\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2081.png\" \/><\/a><a title=\"Add to Yahoo Buzz\" href=\"http:\/\/buzz.yahoo.com\/buzz?targetUrl=http%3A%2F%2Fblog.webroot.com%2F2011%2F04%2F05%2Fwebroot-answers-your-security-questions&amp;headline=Webroot%20Answers%20Your%20Security%20Questions\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Yahoo Buzz\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2091.png\" \/><\/a><a title=\"Add to Newsvine\" href=\"http:\/\/www.newsvine.com\/_wine\/save?u=http%3A%2F%2Fblog.webroot.com%2F2011%2F04%2F05%2Fwebroot-answers-your-security-questions&amp;h=Webroot%20Answers%20Your%20Security%20Questions\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Newsvine\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2101.png\" \/><\/a><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2111.png\" \/><\/p>\n<p>I&#8217;m very pleased to present today the first in a series of videos we&#8217;ve produced. The videos have the lofty goal of addressing the most pressing questions relating to malware, cybercrime, and online fraud. We&#8217;ll take you behind the scenes at Webroot and introduce you to some of our Threat Research team in the process.<\/p>\n<p>In this first video, Webroot&#8217;s Director of Threat Research, <strong>Jeff Horne<\/strong>, answers a question submitted to us <a href=\"http:\/\/twitter.com\/#!\/webroot\" target=\"_blank\">via Twitter direct message<\/a> about the motives behind most cybercrime, and whether there are any examples of malware or other types of malicious online activity that have been motivated by anything other than financial gain.<\/p>\n<p>[vimeo 21951624]<\/p>\n<p>We&#8217;re planning to release a new video every other Monday from now on. When you&#8217;ve thought of that question you always wanted to know the answer to, tweet <a href=\"http:\/\/twitter.com\/#!\/webroot\" target=\"_blank\">@webroot<\/a> or send an email to <strong>blog <\/strong>(at)<strong> webroot.com<\/strong>, and we&#8217;ll answer the ones about cybercrime. We&#8217;ll try not to disappoint, but offer no promises. If you think of questions about something else, send them to <a href=\"http:\/\/twitter.com\/#!\/DrPhil\" target=\"_blank\">Dr. Phil<\/a> or <a href=\"http:\/\/twitter.com\/#!\/CraigyFerg\" target=\"_blank\">Craig<\/a>. We look forward to your letters!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I&#8217;m very pleased to present today the first in a series of videos we&#8217;ve produced. The videos have the lofty goal of addressing the most pressing questions relating to malware, cybercrime, and online fraud. We&#8217;ll take you behind the scenes at Webroot and introduce you to some of our Threat Research team in the process. [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[3929,8431,8527,8525,4211,3477,3609,6959,4973,4063,8529,3569,4061,4201,4071,7191,4161,3525],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/4189"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=4189"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/4189\/revisions"}],"predecessor-version":[{"id":23924,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/4189\/revisions\/23924"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=4189"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=4189"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=4189"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=4189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}