Our latest blog posts
In 2017, a man was arrested for stealing $100 million from two tech companies by launching an elaborate cyber attack. He didn’t use ransomware. And he didn’t use some kind of advanced, zero-day malware.
The attacker took an approach that typically gets less attention than the latest and greatest threats — it’s known as spoofing.
There are dozens of different kinds of malware: viruses, Trojans, bots, ransomware, and plenty more. All of them can wreak absolute havoc on your computer if you’re not protected.
One of the most nefarious of the bunch is the class of malware known as computer worms.
Safety Detective’s Aviva Zacks had the chance to interview Webroot’s Senior Director of Product, Andy Mallinger, and took it! Here are his thoughts on phishing and how Webroot is helping protect consumers and small businesses from cyberattacks.
Safety Detective had the pleasure of interviewing Sophos Product Manager Dean Mekkaway, who helped us understand how SophosLabs stays at the forefront of cybersecurity.
We’ve written extensively on the various attacks that your computer can experience simply by browsing the internet. If you type in the wrong address on your browser, you can get hit by a man-in-the-middle attack. Download the wrong file, and suddenly your browser, homepage, and ads all look different.
Imagine that someone in your computer could see everything you write. Hackers have access to a specific kind of malware known as a keylogger. These pieces of software record and transmit everything you do with your keyboard and mouse. That means every word you type – even words you type and then subsequently delete. It means every email you send, every chat message, every Skype message, every Slack message, every tweet, every Facebook update, and every URL your type into your browser.
Shovelware. Bloatware. Adware. There refer to programs that are running on your PC – and that may be active right now – but that most people don’t know about and never use. These programs clog your limited hard drive space, hog your memory, and generally degrade the performance of your computer.
You kept your antivirus software up-to-date. You had a firewall in place. Your employees went through all necessary cybersecurity awareness training.
And yet, your company still experienced a security incident. Now, you’re left wondering—what is a zero-day exploit (and how did it get past my cyber defenses)?
In the golden age of digital advertising, we’re constantly bombarded with ads, pop-ups, pop-overs, and video overlays as we browse the web.
While sometimes annoying, most of these ads are easily dismissed or ignored, and they’re often legitimate efforts by publishers to monetize their content.
SQL is a programming language that allows programmers to “talk” to large databases using nearly-plain English.
It can access and manipulate data held in a number of tables on a server. When it comes to websites, those tables might include sensitive items like usernames, passwords, credit card numbers, and more.