Date | Title | Description | Source |
07.03.2024 | Кто витает в облаках, или Как хакеры атакуют MSP-провайдеров... | Допустим, вы решили грабить банки. На дворе 2024-й и вы не спали в криокамере 50 лет, поэтому вряд л... | habr.com/r... |
17.12.2023 | Holiday shopping safety: FIVE tips for secure online shoppin... | Here are online shopping tips to make sure your payments are secure.Photo: Tumisu/PIXABAY
In the mid... | thesouthaf... |
20.02.2023 | Zero trust, XDR prominent in Gartner’s Hype Cycle for Endpoi... | Every enterprise is in an endpoint security arms race. Attackers adapt their tactics faster than the... | venturebea... |
27.01.2023 | 10 steps every business can take to avoid a cybersecurity br... | Check out all the on-demand sessions from the Intelligent Security Summit here.
Businesses that surv... | venturebea... |
13.12.2022 | Why the manufacturing sector must make zero trust a top prio... | Check out all the on-demand sessions from the Intelligent Security Summit here.
By making zero trust... | venturebea... |
23.11.2022 | Where CISOs are getting quick zero-trust wins today to save ... | Check out the on-demand sessions from the Low-Code/No-Code Summit to learn how to successfully innov... | venturebea... |
15.11.2022 | The manufacturing industry’s security epidemic needs a zero-... | This article is part of a VB special issue. Read the full series here: Zero trust: The new security ... | venturebea... |
24.10.2022 | How self-healing endpoints are a solution to identities unde... | Register now for your free virtual pass to the Low-Code/No-Code Summit this November 9. Hear from ex... | venturebea... |
08.10.2022 | How Shadow-Banned Influencers Can Lift Their Ban | Share
Tweet
Share
Share
Email
Have you noticed lately that life on your social media accounts is som... | techbullio... |
22.08.2022 | Why getting endpoint security right is crucial | Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand libr... | venturebea... |
21.04.2022 | New platform aims to stop weaponization of phishing domains | New phishing sites are launched on a regular basis, even back in 2017 1.4 million were launching eve... | betanews.c... |
15.04.2022 | 10 things CISOs need to know about zero trust | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI an... | venturebea... |
15.03.2022 | Webroot vs. Symantec: Endpoint security software comparison | Image: Adobe Stock
I’ve worked extensively with Symantec and Webroot products in my role as a Window... | techrepubl... |
19.10.2021 | Threat detection marketplace SOC Prime nabs $11.5M | SOC Prime, a Boston, Massachusetts-based startup developing a threat detection marketplace, today an... | venturebea... |
19.10.2021 | Threat detection marketplace SOC Prime nabs $11.5M | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI an... | venturebea... |
16.09.2021 | Cybersecurity is not a one-stop-shop | Since the start of the pandemic, the way business is conducted has changed permanently, with many wo... | betanews.c... |
06.07.2021 | Open Text : How to select the best endpoint security solutio... | The thought that a chain is only as strong as its weakest link is something that can keep IT securit... | marketscre... |
18.05.2021 | OPEN TEXT CORPORATION
Open Text : Addressing cyber resilien... | The ransomware attack on Colonial Pipeline was yet another wake up call for critical infrastructure ... | marketscre... |
26.01.2021 | Social Media Cybercrime Reality Hits as North Korean Hacks T... | Sieeka Khan, Tech Times 26 January 2021, 09:01 am
(Photo : Pexels/Soumil Kumar) North Korean hacker ... | techtimes.... |
17.12.2020 | Influitive Announces its 2020 BAMMIE Award Winners | Every year we are awed by the strides our customers make in driving and delivering business impact t... | prweb.com/... |
26.11.2019 | How cyberinsurance works to protect companies in case of a s... | Image: wildpixel, Getty Images/iStockphoto
Insurance is a way of life for businesses, as it’s essent... | techrepubl... |
29.10.2019 | Ransomware sees a revival in 2019's worst cybersecurity thre... | Cybersecurity company Webroot has released its third annual Nastiest Malware list which shows ransom... | betanews.c... |
08.10.2019 | Cybercriminals increase use of trusted domains to trick vict... | Nearly a quarter of malicious URLs are being hosted on trusted domains, as hackers know trusted doma... | betanews.c... |
24.09.2019 | Why we get hooked by phishing attacks | What makes us click on phishing links? A new study from Webroot has surveyed 4,000 office profession... | betanews.c... |
08.05.2019 | Americans are overconfident about cybersecurity | A new study from Webroot that examines the cyber hygiene habits of 10,000 Americans, 200 in each sta... | betanews.c... |
14.03.2019 | Businesses plan to use more AI and machine learning in cyber... | The use of more artificial intelligence to improve security has been touted for a while. New researc... | betanews.c... |
28.02.2019 | Home endpoints twice as likely to be infected as businesses | Despite the fact that in recent months we've seen cybercriminals focusing their efforts on businesse... | betanews.c... |
11.02.2019 | Term Sheet — Monday, February 11 | NOT SO CONFIDENT
Good morning, Term Sheet readers.
Paid Content You can't secure what you can't see ... | fortune.co... |
08.02.2019 | Carbonite to acquire endpoint security company Webroot for $... | Carbonite, the online backup and recovery company based in Boston, announced late yesterday that it ... | techcrunch... |
17.01.2019 | Golpe de phishing promete mostrar quem visitou seu perfil do... | Como descobrir se alguém visualizou seu perfil do Facebook? A resposta é simples: não há como saber.... | tecnoblog.... |
17.10.2018 | Webroot launches VPN to protect Wi-Fi users | Many people rely on connecting to Wi-Fi networks when they are out and about, but using public hotsp... | betanews.c... |
26.06.2018 | SMBs are underprepared for cyberattacks | No business is immune from cyber attack, and smaller companies are often targeted as they lack the r... | betanews.c... |
05.06.2018 | Florida residents have the worst cybersecurity habits in the... | A study by cybersecurity company Webroot in conjunction with the Ponemon Institute finds Florida to ... | betanews.c... |
22.03.2018 | Legacy defenses can't keep pace with new cyber threats | Attacks such as ransomware are able to bypass legacy security solutions because organizations are ne... | betanews.c... |
24.01.2018 | Ransomware happens -- get over it and be prepared | In its recent State of the Channel Ransomware Report, data protection firm Datto found that SMBs pon... | betanews.c... |
14.12.2017 | Over 90 percent of security pros worry about cyber criminals... | While machine learning and artificial intelligence are becoming key to cyber security, a new survey ... | betanews.c... |
27.08.2017 | Are you doing enough to address your risk? Here are a season... | Several years ago, I received an early-morning phone call at home from one of my security staff. Our... | betanews.c... |
01.08.2017 | 71 percent of SMBs are not prepared for cyber security risks | Small and medium sized businesses increasingly feel that they're vulnerable to cyber threats but mos... | betanews.c... |
27.07.2017 | Top 100 Cybersecurity Startups in Q2 of 2017 | With Black Hat in full swing and global cyber attacks making headlines more often than the Kardashia... | tech.co/ne... |
28.06.2017 | What You Need to Know About the Petya Ransomware Attack | Cybersecurity concerns, true to most experts' warnings, have appeared to increase over the last few ... | tech.co/ne... |
24.09.2016 | M&A roundup - week ending 9/24/16 | Facebook bought Nascent Object; Airbnb acquired Trip4real; Google purchased Api.ai
Facebook acquired... | vator.tv/n... |
21.09.2016 | Malware attacks are declining but getting cleverer | In the first six months of 2016 users were twenty percent less likely to encounter malware than in t... | betanews.c... |
19.09.2016 | Colorado’s Webroot Buys CyberFlow Analytics, Expands in San ... | Share Share on Facebook Share on Twitter LinkedIn Email Reprints
Not long after ViaSat (NASDAQ: VSAT... | xconomy.co... |
23.08.2016 | Meet Monero, the Currency Dark Net Dealers Hope Is More Anon... | Not even bitcoin is anonymous enough for some criminals on the dark net.
For years, the cryptocurren... | vice.com/e... |
15.05.2016 | How threat intelligence sharing can help deal with cybersecu... | Ben Dickson Contributor
Ben Dickson is a software engineer and the founder of TechTalks.
More posts ... | techcrunch... |
12.05.2016 | New Webroot solution uses threat intelligence to secure IoT ... | As the Internet of Things takes off, gateways are increasingly being used to connect legacy and next... | betanews.c... |
23.02.2016 | Endpoint specific malware renders signature detection useles... | Signature-based security could be virtually useless as 97 percent of malware is unique to a specific... | betanews.c... |
09.12.2015 | SMBs lack the resources to protect themselves from cyber att... | Only 37 percent of SMBs believe that their organizations are fully equipped to handle IT security ac... | betanews.c... |
13.10.2015 | Everyone and Their Mother Is Worried About Getting Hacked | Everyone is getting hacked these days.
At the end of last year, my old colleague Christina Warren wr... | vice.com/e... |
01.10.2015 | Top 5 Security Apps for Android Phones | Protecting your computers, tablets and phones from theft and hackers should be a priority, in order ... | tech.co/ne... |
22.09.2015 | Your mother should know (how you use your computer at colleg... | A new report by internet security specialist Webroot on the eve of National Cyber Security Awareness... | betanews.c... |
04.09.2015 | Ten reasons threat intelligence is here to stay | Over the past couple of years, the volume and frequency of new malware and its variants has exploded... | betanews.c... |
04.08.2015 | Web isolation platform adds threat intelligence to improve a... | We reported on the Menlo Security Web Isolation Platform, which aims to eliminate threats before the... | betanews.c... |
13.07.2015 | How malware and gaming have grown up in parallel | Since the advent of personal computing, games and malware have developed more or less side by side. ... | betanews.c... |
02.05.2015 | 7 PC Security Practices to Safeguard Your Personal Info | There are many threats to your computer’s security. Don’t wait for an attack to strike: protect your... | tech.co/ne... |
02.05.2015 | 7 PC Security Practices to Safeguard Your Personal Info | There are many threats to your computer’s security. Don’t wait for an attack to strike: protect your... | tech.co/ne... |
22.04.2015 | Cybercrime gets smarter and more complex | There are 85,000 new malicious IPs launched every day and the top phishing targets are technology co... | betanews.c... |
31.03.2015 | Enterprise security places increased reliance on threat inte... | It's easier to combat security threats if you're prepared for them so it isn't perhaps surprising th... | betanews.c... |
04.03.2015 | MRG Effitas releases latest Online Banking Browser Security ... | Security research company MRG Effitas has released its Q4 2014 Online Banking Browser Security repor... | betanews.c... |
14.11.2014 | New cryptoware title borrows page from drug dealers | Enlarge
Webroot reader comments 118 with 69 posters participating
Share this story
Share on Facebook... | arstechnic... |
03.10.2014 | Ransomware is an increasing security concern for IT professi... | There are always plenty of security concerns causing furrowed brows of IT professionals, but a surve... | betanews.c... |
10.07.2014 | 95 percent of employers are concerned about security risks f... | Allowing employees to use their own devices is an increasingly popular trend, but BYOD opens up secu... | betanews.c... |
20.05.2014 | One of world’s more pricey trojans is veritable Swiss Army k... | D-M Commons reader comments 34 with 29 posters participating
Share this story
Share on Facebook
Shar... | arstechnic... |
30.04.2014 | New Colorado Conference to Connect Top Startups with Nationa... | Share Share on Facebook Share on Twitter LinkedIn Email Reprints
Some of Colorado’s heaviest hitters... | xconomy.co... |
08.01.2014 | Enhanced Protection for Mobile Devices: gateprotect upgrades... | Hamburg, January 8th 2014 – The German IT security specialist gateprotect is now offering an upgrade... | realwire.c... |
31.12.2013 | 6 tech tricks for having a fun (and regret-free) New Year’s ... | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI an... | venturebea... |
28.10.2013 | Webroot Secures Future by Moving Consumer Anti-Malware Suite... | Share Share on Facebook Share on Twitter LinkedIn Email Reprints
A few years back, the team at Webro... | xconomy.co... |
13.08.2013 | gateprotect and Webroot Partner to Deliver a Holistic Approa... | Agreement Enables Innovative German Security Specialist to Deliver Real-Time Threat and Data Protect... | realwire.c... |
23.07.2013 | Equal-opportunity malware targets Macs and Windows | F-Secure reader comments 78 with 47 posters participating
Share this story
Share on Facebook
Share o... | arstechnic... |
06.08.2012 | Olympics Android app steals text messages, browsing history | Did you miss a session from GamesBeat Summit 2022? All sessions are available to stream now. Learn m... | venturebea... |
19.07.2012 | Free Webroot Tool Diagnoses PC Issues In Less Than 2 Minutes | Webroot® System Analyzer Scans an Entire System to Diagnose Vulnerabilities and Performance Issues
B... | realwire.c... |
10.04.2012 | Risky Business: New Data from Webroot Uncovers Disconnects, ... | Adults Feel Safer Meeting a Stranger in Person than Opening an Email Attachment from One
Bracknell, ... | realwire.c... |
19.01.2012 | Webroot Makes Key Appointments to Drive Global Sales of Clou... | Technology Veterans Will Steer Aggressive International Market Growth and Business Expansion
Brackne... | realwire.c... |
19.01.2012 | Webroot Engages Former Symantec Executive to Support Global ... | Industry Veteran Will Drive Aggressive Market Growth and Strategic Worldwide Business Development
Lo... | realwire.c... |
09.01.2012 | Samsung develops emotion-sensing smartphone | You are too angry to update Facebook, please try again later. Judging by an early prototype Samsung ... | extremetec... |
17.11.2011 | Festive gift buying goes mobile in 2011: Webroot Research | Purchases via mobile devices will more than double while the majority of users leave their data and ... | realwire.c... |
19.10.2011 | Webroot Appoints Jacques Erasmus Chief Information Security ... | Ten-year Cyber-security Expert to Oversee Global Data Security Measures and Compliance
Bracknell, UK... | realwire.c... |
04.10.2011 | Webroot Delivers the Fastest, Lightest and Least Demanding C... | Integrates Security for PC, Android and iOS Users with Simple, Centralised Management
Bracknell, UK.... | realwire.c... |
27.09.2011 | Webroot Enhances Hosted Web Filtering Services For Customers... | Real-Time Service Updates Instantly Protect Internet Users from Malicious Sites and Zero-Day Threats... | realwire.c... |
20.09.2011 | Only a Quarter of Employees Bypass Security Policies: Webroo... | Report finds top brass spend more time than their employees planning personal activities
Bracknell, ... | realwire.c... |
16.08.2011 | Habits of Social Networkers: 54 Percent of Users are Addicte... | Third annual report finds cybercrime on social networks continues to climb despite increased privacy... | realwire.c... |
02.08.2011 | Webroot Strengthens Its Banking Security Portfolio with the ... | Webroot® Mobile Security applications provide protection for mobile banking customers against Zeus a... | realwire.c... |
23.06.2011 | New Appointment to Drive Financial Growth and Operational Ef... | Bracknell, UK, June 23, 2011 — Webroot, the first Internet security service company, has appointed J... | realwire.c... |
01.06.2011 | Cloudmore chosen by Webroot as European Security-as-a-Servic... | Bracknell, UK, 1 June 2011 - Webroot, the first Internet security service company, today signed a st... | realwire.c... |
19.04.2011 | UK Companies Spend 18 Days A Month Maintaining On-Premise Se... | New Research from Webroot Finds Organisations with Highly Mobile Workforces More Susceptible to Infe... | realwire.c... |
06.04.2011 | Hotspot Shield snags 1 million users overnight, proves priva... | Political unrest quite literally turned Hotspot Shield into an international success story overnight... | betanews.c... |
04.04.2011 | Webroot Introduces Smartphone and Tablet Security | Webroot® Mobile Security for Android Smartphones and Webroot® Tablet Security for Android Deliver Ex... | realwire.c... |
07.03.2011 | FirstBank Fights Back Against Cybercrime With Webroot Subsid... | Powerful security software, Prevx SafeOnline, protects customers from increasingly intelligent onlin... | realwire.c... |
24.02.2011 | Webroot signs RMS IT Security as an Authorised Partner | Bracknell, UK, 24 February, 2011 - Webroot, the first Internet security service company, has today a... | realwire.c... |
08.02.2011 | Webroot Appoints Jeff Santelices Vice President Of Worldwide... | Former IBM Executive Will Grow Outbound OEM Relationships to Drive Aggressive Business Expansion
Bra... | realwire.c... |
19.01.2011 | Webroot Provides Channel Partners with Enhanced Email Securi... | Bracknell, January 19, 2011 – Webroot, the first Internet security service company, today announced ... | realwire.c... |
17.11.2010 | Webroot Releases Annual Holiday Cybersecurity Survey | Shoppers plan to buy more gifts online this year; some online habits hold steady while others worsen... | realwire.c... |
15.11.2010 | Webroot Research Shows Half of SMBs Block Employee Access to... | Internet Security Service Provider Reveals how Social Networking has Impacted SMB Security in 2010
B... | realwire.c... |
01.11.2010 | Webroot Acquires Prevx | Two Cloud Security Leaders Join Forces to Transform How Security is Delivered
Bracknell, UK – 1 Nove... | realwire.c... |
17.09.2010 | Back To School: Trying Our Best To Stay Safe Online In 2010 | Students! As anyone on a Windows machine who has visited good ol’ CrunchGear in the past few weeks k... | techcrunch... |
25.07.2010 | Security-as-a-Service Firm Introduces “Complete” Suite | Today Webroot, the security-as-a-service company, launched a new, more comprehensive security suite.... | readwrite.... |
07.07.2010 | Webroot Acquires Hosted Internet Security Services Provider ... | Internet security company Webroot today announced it has acquired BrightCloud, a Web content classif... | techcrunch... |
25.05.2010 | Adobe Reader faces its first genuine competition from a free... | Download Nitro PDF Reader 1.1.1.13 from Fileforum now.
Even today, we tend to use the phrase "A... | betanews.c... |
22.09.2009 | DEMO: Webroot provides security for users who log in from mu... | Webroot is an established security software vendor that has a presence in both desktop and web-based... | venturebea... |
22.09.2009 | DEMOfall 09: Your guide to VentureBeat’s coverage | We’re in the middle of DEMOfall 09 today in San Diego, where 56 tech companies will launch new produ... | venturebea... |