News, Announcements, Tech Discussions
Hello... Today I learned that Webroot Community postings are Google-searchable with no Community login. I just entered my username and “Webroot" in the search box. This concerns me, since sensitive security information might be discussed/disclosed in the Community. Perhaps a caution to those posting would be appropriate. Please excuse me if I have missed a caution notice. Examples of searchable sites follow: [url=/t5/kudos/userpage/user-id/3580/tab/users-who-kudoed#.UjnXOdKsiSo]https://community.webroot.com/t5/kudos/userpage/user-id/3580/tab/users-who-kudoed#.UjnXOdKsiSo[/url] [url=/t5/Webroot-SecureAnywhere-Antivirus/Threat-Removal-Information/m-p/33384#.UjnXcNKsiSp]https://community.webroot.com/t5/Webroot-SecureAnywhere-Antivirus/Threat-Removal-Information/m-p/33384#.UjnXcNKsiSp[/url] [url=/t5/Webroot-SecureAnywhere-Complete/Shutting-Down-SecureAnywhere-Protection/td-p/9824#.UjnXmNKsiSo]https://community.webroot.com/t5/Webroot-SecureAnywhere-Complete/Shutting-Down-Secur
Police in Argentina have arrested a 19-year-old man accused of heading a gang of hackers who targeted international money transfer and gambling websites. Dubbed "the superhacker", the teenager was making $50,000 (£31,500) a month, working from his bedroom in Buenos Aires, police say. The arrest operation shut down the power to the entire neighbourhood to prevent the deletion of sensitive data. Police say it took them a year to close in on the teenager. The young man lived with his father, a computer expert, in Buenos Aires. [url=http://www.bbc.co.uk/news/world-latin-america-24089050]Full Article[/url]
If you've used Windows 8, or even just seen the ads for it, you'll know it has a feature called Picture Passwords. You choose a picture, any picture, and then "annotate" it with three finger movements: you can tap a point, draw a stroke, or sweep a circle. The picture helps you to remember where you made the gestures, so you can repeat them reliably enough to pass the test and unlock your device. If you have a touch screen tablet, Picture Passwords are surprisingly handy. (Pun intended.) But how safe are they? One of the ads I've seen for Windows 8 made a pretty big deal out of the coolness of Picture Passwords, and illustrated their convenience with a login sequence to which my immediate reaction was, "Surely not?" The ad showed a picture of someone's two young daughters, heads close together and looking at some distant object; the password involved circling their heads and then drawing a line in the direction they were looking. That struck me as far, far too easily guessed; a bit li
[url=http://pewinternet.org/Reports/2013/Anonymity-online/Main-Report/Part-1.aspx]A new study from the Pew Research Center[/url] features a bevy of interesting statistics about online anonymity. Key highlights include the following: [list] [*]86% of internet users have taken steps online to remove or mask their digital footprints—ranging from clearing cookies to encrypting their email, from avoiding using their name to using virtual networks that mask their internet protocol (IP) address. [*]68% of internet users believe current laws are not good enough in protecting people's privacy online [*]55% of internet users have taken steps to avoid observation by specific people, organizations, or the government [*]21% of internet users have had an email or social networking account compromised or taken over by someone else without permission. [*]13% of internet users have experienced trouble in a relationship between them and a family member or a friend because of something the user pos
In this episode of ThreatVlog, Tyler Moffitt talks about the 2 million user hack that Vodafone experienced last week, which investigators are saying is an inside job. He also goes into the arrest of Superhacker out of Argentina, who turned computers into zombies and was able to steal $50,000 a month from users. And in big news, Grand Theft Auto V was released today, and already torrents are being discovered packed full of malware and phishing schemes.
[quote][b]Wayne Cunningham[/b] wrote: [img]http://asset2.cbsistatic.com/cnwk.1d/i/tim2/2013/09/11/BMW_i8-8426_610x407.jpg[/img] [i]In the upper reaches of automotive performance, the hybrid sports car is becoming a real thing. Witness the [url=http://reviews.cnet.com/2300-31346_7-10016048.html]Ferrari LaFerrari[/url], [url=http://reviews.cnet.com/coupe-hatchback/2014-porsche-918-spyder/4505-10867_7-35827268.html]Porsche 918 Spyder[/url], and [url=http://cnettv.cnet.com/9742-1_53-50142205.html]McLaren P1[/url]. Those examples seem like efforts to maintain the relevance of high-end performance in an oil-starved world.[/i] [i]But BMW may just be cracking the code with its i8.[/i] [i]Unlike the competition, which tend toward evolutionary changes built from existing models, BMW designed the i8 as a wholly new car, constructed from the ground on up to exemplify performance and minimal fossil fuel consumption. And deviating from the [url=http://reviews.cnet.com/coupe
[quote][b]Jessica Dolcourt[/b] wrote: [img]http://asset3.cbsistatic.com/cnwk.1d/i/tim2/2013/09/16/QuasarIV_home_610x455.jpg[/img] [i]The subject of cell phone security haunts every major mobile player, but none so defiantly throws down the gauntlet to data thieves like the smartphone startup [url=http://www.qsalpha.com/]QSAlpha[/url] and its Quasar IV "cipherphone."[/i] [i]A self-funded project launched Tuesday through Kickstarter-like Web site [url=http://www.indiegogo.com/]Indiegogo[/url], the Quasar IV runs on a security backbone of hardware encryption that promises to only share data -- email, phone calls, and texts -- with others who have a "trusted" identity using the same Quasar IV smartphone.[/i] [i]While the cybersecurity specs command the show (and more on that later,) the strangely named Quasar IV is specced out with top-of-the-line Android goods.[/i] [/quote] [u][b]Read [url=http://reviews.cnet.com/smartphones/qsalpha-quasar-iv/4505-6452_7-35827841.
[quote][b]Wills Robinson[/b] wrote: [i]Sleeping on the job is something every employee wishes they could get away with.[/i] But those who have tried and failed to take a quick nap on their keyboard without detection would do well to take a few tips from this baby squirrel. [i]Because the tiny animal, called Rob, has proved he can sleep almost anywhere, from the inside of a coffee mug to its owner's laptop.[/i] [img]http://i.dailymail.co.uk/i/pix/2013/09/17/article-0-1BDEFA6A000005DC-56_634x470.jpg[/img] [img]http://i.dailymail.co.uk/i/pix/2013/09/17/article-0-1BDEF88B000005DC-436_634x633.jpg[/img] [img]http://i.dailymail.co.uk/i/pix/2013/09/17/article-0-1BDEF4C6000005DC-865_634x471.jpg[/img] [/quote] [u][b]Full story [url=http://www.dailymail.co.uk/news/article-2423317/Nodding-keyboard-This-tiny-palm-squirrel-fall-asleep-ANYWHERE-prefers-owners-shirt-pocket.html]here[/url][/b][/u].
Webroot users, [url=http://webroot.qualtrics.com/SE/?SID=SV_74LZ0KxX4BOqYRL]this survey[/url] is for you! This 9 question survey should take less time than one of our blazingly quick scans. Please take a moment to provide some quick feedback to help us improve. Thanks! :cathappy: The survey will close Sept. 20th.
Well, the 2013 HP Pwn2Own has been launched - top prize - hack a mobile device baseband processor (the bit that connects the phone to the carrier network) and win $100,000 USD. This is part of HP's ZDI (zero day initiative) and certainly worth watching to see what comes out of the contest. [url=http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Mobile-Pwn2Own-2013/ba-p/6202185#.Ujh-6cZwqrk]http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Mobile-Pwn2Own-2013/ba-p/6202185#.Ujh-6cZwqrk[/url] Wayne
Mozilla last week said that slower-than-expected progress on Firefox for Microsoft's Windows 8 "Modern" user interface (UI) means that the touch-based browser likely won't launch until late January. Estimates a month ago by the open-source developer had pegged Dec. 10 as the target release for the "Metro-ized" version of Firefox. Metro was the name Microsoft once applied to the Windows 8 and Windows RT radical UI, but the company ditched the moniker in August 2012 over a trademark dispute with a German retailer. The Firefox "Preview Release" will still be packaged with the Aurora build of Firefox 26 for the Windows desktop when it launches Tuesday, as originally planned. "The goal of the Metro Preview Release is to gather feedback and defects from the larger Aurora community," Mozilla said in notes published on its website from a planning meeting last Wednesday. "Whether or not the Metro Preview Release will graduate from Aurora to Beta and Release channels is still to be determined
[img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/6263iC9E13234EF9C1B08.jpg[/img] I don't wish to block all domains which would cause google.com to be blocked but I want to block both Google Chat and Google Plus from being accessed. So far this isn't working. So what am I doing wrong? Thanks.
The Folder pane on the left disappears or Empty had to remove [url=http://support.microsoft.com/kb/2817630/en-us]KB2817630[/url] which repaired that and [url=http://support.microsoft.com/kb/2810009/en-us]KB2810009[/url] failed to install twice so I did it manually and Windows update still says it's not installed so I had to hide them. [url=http://social.technet.microsoft.com/Forums/lync/en-US/8ebce46d-1645-4909-8951-d1ca954179ac/outlook-2013-folder-pane-is-empty]http://social.technet.microsoft.com/Forums/lync/en-US/8ebce46d-1645-4909-8951-d1ca954179ac/outlook-2013-folder-pane-is-empty[/url] [i][b]TH[/b][/i]
Following in the footsteps of it recent [url=https://community.webroot.com/t5/Security-News/Using-Windows-XP-is-about-to-become-a-whole-lot-scarier/td-p/53684#.Uh9773-wXos]Windows XP End-of-Life announcement[/url], Microsoft has decided to do away with Office 2003, confirming that come April 2014, they'll no longer continue supporting the product that is still being used by many businesses today. As is usually the case with decisions made to end support of a popular and important product, Office 2003's burial will be problematic, according to the [url=http://www.pcworld.com/article/2047723/office-2003s-burial-will-resurrect-hacker-activity.html]PC World report.[/url] One of those problems (as will be the case with XP) will be the resurgence of hacker activity. According to Wes Miller, a research analyst for Directions of Microsoft, here's why: "Microsoft has done a really good job of battening down most of the really big problem areas in Office 2003 a long time ago....Neverthele
This story really makes you wonder how may malicious apps may already be on Apple's App Store. Apple is very proud of its review process, which it claims prevents any malware from making into the store. However, this exploit proves quite the opposite, and it also proved exactly how rigorous the Apple review process is. And how rigorous is that? Well, according to the researchers, Apple runs an app for a few seconds and then gives it a green light if it doesn't find any issues using a static form of analysis - in other words, it's not exactly a robust process. [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/5824i380538A651047454.jpg[/img] From [url=http://www.technologyreview.com/news/518096/remotely-assembled-malware-blows-past-apples-screening-process/]TechnologyReview.com[/url]: [i]Mystery has long shrouded how Apple vets iPhone, iPad, and iPod apps for safety. Now, researchers who managed to get a malicious app up for sale in th
[img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/6231i3F2779F24B654DB1.jpg[/img] Webroot will be attending the CompTIA EMEA Member & Partner Conference at the Lancaster Hotel in London on October 21st and 22nd. The EMEA Member & Partner Conference brings together over 350 leading IT VARs, vendors, distributors, training companies and academies from across the region to connect, collaborate and gain insight into the latest technologies and business trends to help grow their businesses. CompTIA’s UK Channel Community will meet on the 21st of October for a Channel community meeting followed by a networking dinner. Webroot will be exhibiting at the event and will be located at tabletop #44 on October 22nd. Attending from Webroot will be Louise Deverell ([user=4820][/user]), Adam Nash ([user=2704][/user]) & William Fletcher ([user=42][/user]). Website url: [url=http://www.comptia.org/emea.aspx]http://www.comptia.org/emea.asp
Security researchers at Intego have reported the discovery of the latest variant of the OSX/Tibet Mac malware. The malware, which Intego has dubbed OSX/Tibet.C, has been distributed in the form of a poisoned Java applet on compromised websites. This ia common trick used by hackers today. Hackers breach a website known to be visited by a particular group of targets, rather than directly launch an attack against the targets themselves. Eventually someone visits the “watering hole” and their computer ends up poisoned and compromised. [url=http://grahamcluley.com/2013/09/mac-malware/]Full Article[/url]
What a last 24 hours.After a software install i rebooted and win8 got stuck in a repair loop.Tried pretty much everything.Could not access my acronis backups on the external.Nothing i tried worked,so went out this morning and bought the full edition of windows 8 pro and did a clean install.As my prev win8 install was a download and an upgrade edition,i could not access any of that info.It winds up working out better as a clean install is always better and the pc is dejunked software wise.Slowly getting all the stuff back in and of course webroot was my first install after the windows updates.I want to get some decent imaging software installed again,but it's not in the budget right now as i just shelled out $200 for win8.My acronis True image was the 2013 edition which was purchased as an upgrade to the 2012.Unfortunately the prerequisite for installing an upgrade edition is a pre-existing install.I cannot wait for this day to be over.Thankfully this all happened on my vacation.Hope al
Hey there, I work for Technical Support at onOneSoftware.com and our applications always seem to conflict with your virus protection. I have duplicated the problem myself. What are the steps we can take to prevent this and get our software on your whitelist? Thanks, Nathan
Personal details of more than two million customers of Vodafone Germany have been stolen by a hacker. Vodafone said the attacker got access to customer names, addresses, bank account numbers and birth dates. The trove of information was stolen from a database sitting on the company's internal network. The operator said customers had been told about the breach and warned to watch out for "phishing" messages that try to extract more personal data. "Vodafone deeply regrets the incident and apologises to all those affected," the operator said in a statement. [url=http://www.bbc.co.uk/news/technology-24063621]Full Article[/url]
A new phishing attack targeting outdated Adobe Reader and Java versions is being disseminated in the form of a fake CNN alert email claiming that the U.S. has bombed Syria. [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/6217i7668753FA16FD16A.png[/img] img/source: [url=http://threatpost.com/fake-cnn-alert-says-us-bombed-syria-leads-to-malware]Threatpost[/url] This one is easy to spot because 1. The U.S. has not actually bombed Syria, and 2. As is the habit of many malware authors, the grammar is atrocious. For instance, the tagline says, "It was dropped about 15 bomn on stalitsu syria Demascus.” If a CNN writer actually wrote that, I'm Santa Claus. Notably however, Casey Wian is an actual CNN reporter, so they did get that right. Keep an eye out for this threat, and don't let it try to trick you into opening the link.
Intel has launched Bay Trail - a family of chips it hopes will help it make further inroads against processors designed by its rival ARM. The chips are designed for use in low-power devices, including tablets. They incorporate what the US company calls "3D transistors", which it introduced to its PC chips in 2012, designed to boost computational power while using less energy. One analyst said Bay Trail could pose a serious challenge to ARM. Unlike Intel, the British company does not make chips of its own but rather makes money by licensing its designs to other companies, including Qualcomm, Apple and Nvidia, which then adapt them for their own uses. ARM's designs currently dominate central processing units (CPUs) used in smartphones and tablets, while Intel's x86-based architecture is far more common in desktop and laptop computers. This has been a consequence of ARM having the reputation of being the more energy efficient of the two. But the new Bay Trail chips may cause some tablet m
[b]Java SE Runtime Environment 7u40 Released September 10, 2013[/b] [b] [/b] [b]Download:[/b] [u][b][url=http://www.oracle.com/technetwork/java/javase/downloads/jre7-downloads-1880261.html]http://www.oracle.com/technetwork/java/javase/downloads/jre7-downloads-1880261.html[/url][/b][/u] [b]Be sure to download both x64 & x86 if you have a x64 system and uncheck any unwanted add-ons if offered.[/b] Also here is the version verification page: [u][b][url=http://java.com/en/download/installed.jsp]http://java.com/en/download/installed.jsp[/url][/b][/u] [u][b] [/b][/u]I guess it had to happen another update just to make [b]ProTruckDriver's[/b] day! Enjoy Buddy! [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/5388iD61A9DB6BE27C4AC.gif[/img] [i][b]TH[/b][/i]