Help each other out of non-Webroot technical jams and discuss tech-related stuff in general.
- 4,741 Topics
- 12,030 Replies
2014 is upon us! As we said goodbye to 2013, we posted our top security predictions for the new year on our Threat Blog (you can [url=http://www.webroot.com/blog/2013/12/31/top-consumer-security-predictions-for-2014/]read them[/url] here in case you missed it). These predictions, coupled with all the [url=http://www.webroot.com/blog/2013/12/27/cybercrime-trends-2013-year-review/]new malware trends[/url] we saw in 2013, can only mean one thing for the average user - you need to make security a top priority in 2014...Here are 10 security resolutions to follow through on this year. Cheers! [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/7861iD8F90268BF3E9C1D.jpg[/img] (Source: PCMag) [list] [*][b]Create stronger passwords.[/b] Last October's [url=https://community.webroot.com/t5/Security-Industry-News/Adobe-Hacked-Credit-card-information-potentially-exposed/m-p/59117#M2309]massive Adobe breach[/url] reiterated why your password should never be som
I've noticed some other people have had problems with uninstalling webroot. In my case, it kept telling me I couldn't uninstall because it was still running. My unconventional but effective solution was to change the file type (from the applications folder, add .jpg to the app name). It told me I didn't have permission to change the name, and then asked me if I wanted to uninstall it. It worked for me after a long time of mucking around trying to find a solution, so if this helps anyone else - you're welcome!
[b]Computer pioneer and codebreaker Alan Turing has been given a posthumous royal pardon.[/b] It addresses his 1952 conviction for homosexuality for which he was punished by being chemically castrated. The conviction meant he lost his security clearance and had to stop the code-cracking work that had proved vital to the Allies in World War Two. The pardon was granted under the Royal Prerogative of Mercy after a request by Justice Minister Chris Grayling. [b]'Appalling' treatment[/b] "Dr Alan Turing was an exceptional man with a brilliant mind," said Mr Grayling. He said the research Turing carried out during the war at Bletchley Park undoubtedly shortened the conflict and saved thousands of lives. Turing's work helped accelerate Allied efforts to read German Naval messages enciphered with the Enigma machine. He also contributed some more fundamental work on codebreaking that was only released to [url=http://www.bbc.co.uk/news/technology-17771962]public scrutiny in April 2012.[/
From: [url=http://www.telegraph.co.uk/technology/google/10529900/Google-reveals-spike-in-government-removal-requests.html]www.telegraph.co.uk/technology/google/10529900/Google-reveals-spike-in-government-removal-requests.html[/url] [i]The number of government requests to remove content from Google's services has grown dramatically in the last year, according to Google's latest [url=http://www.google.com/transparencyreport/removals/government/]Transparency Report[/url].[/i] [i]Google received 3,846 government requests to remove 24,737 pieces of content between January and June 2013 – a 68 percent increase over the second half of 2012.[/i] [i]The company singled out two countries as being particularly zealous in their removal requests during the first half of the year – Turkey and Russia.[/i] [i]Google received 1,673 requests from Turkish authorities to remove content from its platforms during the period, nearly a tenfold increase over the second half of last year. About
[i]Nineteen Eighty-Four may be three decades late, but it appears to be around the corner. The only question is whether the U.S. government or Google will be Big Brother -- and which would be worse. The NSA wants all our data, but it doesn't seem capable of crunching it. Google is more competent, but that could make it scarier, as it appears to be taking us toward a Terminator future.[/i] As we approach the end of the year, it is time to look back on 2013 and consider what we've learned about technology and human nature. Both Apple and Dell were massively changed; HP, Yahoo and other companies were in various stages of being turned around; and Google went from a company that wanted our private information to one that wanted our jobs. The U.S. government decided, through the NSA, that laws don't apply to it. Those who brought this to our attention (Manning and Snowden) got bigger punishments than the folks in government breaking the law. In 2013, the U.S. government became the least p
[i][u]Summary: CryptoLocker has infected an estimated 250,000 victims, demands an average $300 payout, and is trailing millions in laundered Bitcoin. Dell SecureWorks' new paper sheds light on the unstoppable ransomware[/u].[/i] Dell SecureWorks estimates that CryptoLocker has infected 250,000 victims. The average payout is $300 each, and millions in laundered Bitcoin have been tracked and traced to the ransomware's money runners. Spreading like wildfire from offices to homes, it arrives in email attachments (or over infected networks) to aggressively encrypt all files on a system (including mapped drives, Dropbox files, and all locally connected, network-attached, or cloud-based storage) - while an ominous onscreen timer demands payment within 72 hours. Mess with the files or decline to pay and forget about ever opening your files again. To date, no one has successfully defeated CryptoLocker. The Windows-only ransomware has held rapt the attention of malware fetishists since its f
If drugs traffickers thought the anonymous online black market calling itself Silk Road 2.0 would be any safer from law enforcement than the original, it looks like they had better think again. According to reports by Forbes and TechCrunch, the FBI have made "multiple arrests" of people believed to be involved with Silk Road 2.0 in a crackdown spanning at least two countries. Silk Road 2.0 forum moderators going by the handles "Inigo" and "Libertas" were reportedly arrested in Virginia and Wicklow, Ireland, respectively. A woman identified as the girlfriend of Inigo reportedly said that police told her that they were making simultaneous arrests of the site's users "all around the world." The FBI has since confirmed to Forbes that it had moved against the encrypted marketplace, but it did not disclose the names of any of the people cuffed, or how many arrests had been made in all. US authorities [url=http://www.theregister.co.uk/2013/10/02/silk_road_shutdown/]shut down[/url] the or
Hello everyone! This is pretty much all basic material, and a lot of us have it seen before, but it is alway a good idea to take a quick 'refresher course'. Remember, it may be the season of giving for most of us, but it is also the season in which there are others who work very hard at taking! To those with lesser amounts of computer and internet experience, there are some good tips here! [url=http://money.cnn.com/gallery/technology/2013/12/05/password-hack/index.html]Full Article[/url] Among other tips, this article covers: [list] [*]Safe online surfing habits [*]Passwords [*]What to do if you HAVE been hacked[/list]
How long would it take to hack into an average Web-based server—the kind a company might rent from the likes of Amazon Web Services? To find out, the security company CloudPassage set up six servers, two running Microsoft operating systems and four running Linux-based operating systems, loaded them with various combinations of widely used programs, and invited hackers to take their best shot. Top prize: $5,000. It took just four hours for the winning hacker to captured the flag and the bounty. Worse still, he was a novice. Gus Gray, 28, has worked for a technology company for a little over a year and is taking classes toward a bachelor’s degree in computer science at California Polytechnic State University in San Luis Obispo. “I just thought I’d spend two or three hours poking around and see what I could learn, and it would make for an interesting evening,” he says. That’s one way to put it. As companies shift from old-fashioned and expensive servers managed within four walls to cloud
An effective way to significantly improve software security is to compete head-to-head with the black market for previously unknown vulnerabilities, a security research company says. In an analysis released Tuesday, NSS Labs recommended the formation of an international vulnerability purchase program (IVPP) that would pay competitive prices for so-called zero-day vulnerabilities sold to brokers, subscription services and hackers. From 60 percent to 80 percent of the vulnerabilities today are reported to software vendors for free by security experts more interested in protecting users than profiting off the flaws, NSS says. The remaining vulnerabilities are purchased by vendors or end up on the black market, where cybercriminals can easily buy them. By having a centralized vulnerability purchasing program, "we would get lots of researchers to investigate vulnerabilities," Stefan Frei, NSS Labs research director and co-author of the report, said. In addition, a clear message would be sen
Just purchased a 3 device package from Newegg today & got the download link thru an email with the keycode in the message. My problem is the keycodes first digits are block with asterics (encrypted ?) & only the last 4 are showing. I tried using the last 4 & also copying & pasting the whole line of code but nothing works. HELP Fred
Technology start-up Knightscope last week debuted a prototype security robot that looks a lot like a Dalek (of [i]Doctor Who[/i] infamy.) The K5 Autonomous Data Machine stands five feet high, rolls around on wheels, can sense a variety of potential security threats through an array of sensors, and can instantly notify the police in the event of an emergency. It was shown at the Plug and Play Winter Expo this week, gaining a top-three mention from a panel of 101 Silicon Valley judges. The K5 was noted for its imposing yet “friendly” presence. (It does not nor has it ever, to our knowledge, uttered the word “Exterminate.”) Its abilities and assets include optical character recognition, 360-degree video capture, thermal imaging, microphones for high-quality audio, air quality sensors for detecting chemical and biological threats, an ultrasonic sensor, infrared sensor, radar, and lidar for 3D mapping. Together these sensors allow it to move along a human-set course during normal pat
We have had a few posts and discussions about BitCoins in the Community over the last several months. Today I see another interesting article that shows it is truly amazing how these things are being used. " A Florida man bought a Tesla Model S from a Lamborghini dealership in Newport Beach, Calif., this week. It was the first time the dealer had accepted Bitcoin, it said. "That's right, an electronic currency was used to purchase a fully electric vehicle," the dealer's blog stated. The buyer, who wishes to remain anonymous, bought the top-of-the-line Tesla for $103,000, which was equivalent to 91.4 Bitcoins on Tuesday, the day of the sale, said Cedric Davy, marketing director at the dealership. " [url=http://money.cnn.com/2013/12/06/autos/tesla-bitcoin/index.html?hpt=hp_t3]Full Article[/url] If you want to try it now, just a few days later, you better be prepared to pay more: evidently the BitCoin took a sharp drop in value Fri
Hi everyone, I am running Norton along with Webroot and thought I would post on how I have the configurations set up so that the realtime protections don't both try to quarantine the same file. Usually, Webroot steps aside if Norton detects a threat using it's resident signatures during download, and Norton quarantines it, but sometimes, Norton doesn't detect a threat using resident signatures and instead uses it's cloud signature "WS.Reputation.1". When Norton uses a cloud signature as opposed to a resident signature, it doesn't scan the file and attempt to remove it until after the download is complete, so Webroot thinks "Okay, it's my turn" and also runs the file through it's own cloud. The only problem here is that Norton is also performing it's cloud lookup at the same time, and when they both detect a threat via the cloud, they both try to remove it. I see in the Webroot and Norton quarantines that both say that they removed the file, when in reality only one of them could
I have had a significant amount of problems getting Trojan horses, foreign ISPs and having over 20,000 corrupted program files. It even got through BitDefender. So I got Webroot. This cleaned up all of my problems. However, 3 days after the problems are solved, I have another virus that is impacting my Outlook. So I uninstalled Webroot and reloaded on my PC. But the scan took less than 2 minutes. Hardy enough time to remove the virus and surely what happened before. Why can I not get a complete scan with Webroot???
I think I have a virus, but the Webroot scan is not detecting anything. At least once a day, my laptop becomes possessed and does things like begins typing in all caps, highlights text, launches new internet pages in a separate window, etc. Does that sound like a virus? (My laptop did tip over once and took a tiny spill, so not sure if that could be the cause.) Please help. Thank you.
Hi Guys, I'm going to buy a new notebook, probably just before Christmasmm, and I must admit I have some doubts about the final choice. I am considering the purchase either [b]Samsung Ativ Book 8[/b] ([url=http://www.notebookcheck.net/Review-Samsung-ATIV-Book-8-Touch-880Z5E-X01-Notebook.102303.0.html)or]http://www.notebookcheck.net/Review-Samsung-ATIV-Book-8-Touch-880Z5E-X01-Notebook.102303.0.html) [/url]or [b]Dell Inspiron 7537 [/b]([url=http://www.notebookcheck.net/Review-Dell-Inspiron-15-7537-Notebook.104976.0.html).]http://www.notebookcheck.net/Review-Dell-Inspiron-15-7537-Notebook.104976.0.html).[/url] Both have a 15"6 Touch Full HD screen and 8 GB memory. The main differences: CPU - Dell has i7 Haswell, while Samsung has got i7 IvyBridge Graphics - Dell with NVIDIA GeForce GT 750M 2GB and Samsung with AMD Radeon HD 8870M 2GB. Choosing Dell I have better opportunities to set up configuration and there is also SSD Hard Drive, which makes the performance increased. Choosing Samsung
[img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/7463i147FDC320C8E7B2F.jpg[/img] (source: compurocketusa/BusinessGhana) [b]Internet crooks use personal information to guess your passwords or use them for password resets. [/b] [b]Many of the common security questions (mother's maiden name, where you were born, name of your high school mascott, etc.) are already on your social networks and are publicly available. [/b] [b]It is in your best interest to keep your personal information and loved one's (including relatives and pets) names off of the internet and off of public areas. [/b] [url=http://www.businessghana.com/portal/news/index.php?op=getNews&news_cat_id=1&id=193165][b]Full Article[/b][/url]
If you don't know of Mavis Batey, you should. Her work cracking the Enigma machine's coded messages was crucial to the success of D-Day landings during WWII. Cracking one of the most complicated cipher devices ever created -- the Enigma machine -- may not have been what Britain's Mavis Batey envisioned when she studied the German romantic poets at University College London when World War II broke out. But when she dropped out of school to help with the war effort by becoming a nurse, her German-language skills caught the attention of her superiors, and soon she was asked to train for a more covert kind of duty. "So I thought, great," Batey recalled to The Daily Telegraph in an interview before her death this week at age 92. "This is going to be an interesting job, Mata Hari, seducing Prussian officers. But I don't think either my legs or my German were good enough because they sent me to the Government Code & Cipher School." [url=http://news.cnet.com/8301-1009_3-57612488-
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.