July 8, 2011
How music in the cloud keeps us connected.
Become an online safety advocate for your kids with these simple guidelines.
Cybercriminals are now leveraging the popularity of gaming apps to obtain our personal information.
This generic dropper, similar to a self-extracting Zip file, delivers other malware payloads.
This Windows file-sharing worm copies itself to computers with weak or nonexistent passwords.
Some worms spread themselves through removable hard drives by creating 'autoruns.inf' files.
Good thing you've got Webroot! See what else is trending in the curious world of web security.
Turn your backyard into a pizzeria with this summer-inspired pie.
Become our fan on Facebook for your chance to win one of three sweet prizes.
Why you shouldn't click on male enhancement links.
Webroot threat wrestler Armando Orozco tackles another inquisitive tweet.
What is a firewall, and how does it work?
Hallie, Webroot Team
Since we can't email you a treat, please enjoy some imaginary chocolate chip cookies, courtesy of Webroot!