News, Announcements, Tech Discussions
Webroot and BrightCloud product and services are unaffected by the Log4j vulnerability. For more information on all OpenText products, please see this advisoryhttps://www.opentext.com/support/log4j-remote-code-execution-advisoryCompanies released lists of products affected by a newly discovered vulnerability found in the Apache Log4j library that’s already identified on billions of systems around the globe. In other cyber security news, Volvo suffered a security incident affecting their computer systems that may have also caused a breach of sensitive company information.Hundreds of financial institutions hit by Anubis malwareThe Anubis Android malware that has plagued the Google Play store for several years has resurfaced to again target financial apps for their login credentials. While it is still unclear which group is operating this recent Anubis campaign, many different groups have used it in the past. It is believed that this latest campaign is still in its early stages and is bei
[img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/35517iD4D7C689B6396235.png[/img] Hello Webroot Community! The entire Webroot team is really excited about the launch of our new product, [b]Webroot WiFi Security[/b]. [i][url=https://community.webroot.com/t5/Announcements/Introducing-Webroot-WiFi-Security/m-p/331733]If you didn't see our announcement yesterday you can find out more here.[/url][/i] The team is here today to answer your questions, and please make sure they pertain to WiFi Security and are not general support inquiries.
Now, after I’ve Signed Up and created a new account on Carbonite+Webroot, because this is where the "Get Started" button led to, the alert keeps appearing down to the right corner of the screen, non stop. This is the text of the alertWebroot "Sign up for My Account Manage Subscriptions, access support and more by creating a My Account profile." How do I stop this alert?
I couldn’t let the day go by without mentioning that today is National Pumpkin Day! To celebrate I had pumpkin spice cream cheese on my bagel this morning and Pumpkin spice almond creamer in my coffee! I love the flavor of pumpkin and take full advantage of it when it’s in season!
Zero Trust is a security approach that has gained significant attention in the cybersecurity world in recent years. But what is Zero Trust, and how effective is it in protecting against cyber threats? Cybersecurity professionals are rightfully skeptical of phrases that suddenly become buzzwords overnight. However, there are many legitimate technologies and policies that fall under the umbrella term “Zero Trust”. In this post, we will explore the concepts and technologies involved in Zero Trust and attempt to differentiate marketing hype from factual evidence. DefinitionFirst, let’s define zero trust. At its core, Zero Trust is a security model that assumes all users and devices within a network are untrusted and potentially malicious. This means that, rather than relying on the traditional perimeter-based security model which assumes that everything inside the network is trusted, a Zero Trust approach treats all access requests as coming from an untrusted source. There are a few other
Morning (afternoon?) all, I was reading this article this morning and it really resonated with me, as it undoubtedly will with all of you. Covid has changed so much for everyone. I have a small team of people at a MSP who hybrid work between office and home and as a business we are encouraging (but not forcing) the team to come to the office more often because in my opinion it is great for teamwork, morale and communication. https://www.bbc.co.uk/news/technology-63217973What do you guys use and what is your company's stance on this sort of thing?Have a great day.
Happy Friday all my Webroot loving friends. As the year comes to a close, I thought we could have a little fun. Over the last year, I have traveled to quite a few conferences and worked on a variety of campaigs that have all lead to me accumulating a slew of items at my desk. With 2014 around the corner though, I am running out of space and everything must go, go go! So, I gathered it all on my desk and am going to make it a little game for all of you. Whether you are a power user or brand new member, consumer or business customer, you are all welcome to join. [b]In the replies below, I want you to share something you love about Webroot, be it the company, our family, the product, or whatever it is that you want to share. Post up only one reply. Any others after your first will be removed.[/b] On January 10th, 2014, the team and I will pick 5 posts at random and send those picked a box of random goodies from my desk. You mig
Petition: What Computer users want changed in Windows 10 (Very Important) [img]https://d22r54gnmuhwmk.cloudfront.net/photos/8/jf/no/PXjfnOvWPVjwHtF-800x450-noPad.jpg[/img] To effectively implement and use Windows 10 in our homes and businesses, Microsoft must make changes to both the operating system and the policies the company put in place to support the new OS. Those changes fall into two categories: 1) Microsoft must give Windows 10 users more control over when updates are installed. We need the ability to delay or hide damaging updates that impact the computing experience, have undesirable side effects such as blue screens of death, or reduce the functionality to attached devices. Under the current system of mandated updates, we have been adversely impacted by forced driver and firmware updates plus other patches; we've wasted hours dealing with the unwanted side effects. As long-time Windows users, we understand the need to have quicker and more agile sec
We recently had a system infected with Cryptolocker, we can see a 2Gb DB file has been generated and attempted to scan/remediate this system. During the cleanup/remediation scan the system blue screened and reset itself, after the reset numerous attempts have been made to complete a remediation scan but nothing happens on completion, Cryptolocker appears to be removed however files remain encrypted. Discussing this with support we have been told as the system crashed during the first attempt it no longer knows where it was at and can no longer roll back any changes. This system was left idle during the initial rollback process and it crashed approx 12Hrs into it so I would say that any crash that occurred was due to the rollback itself! Seems a big claim to say that Webroot can prevent and roll back Cryptolocker when the reality seems to be more like we'll have a crack at rolling it back when our product misses it but when it all goes south you're on your own!
[img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/34033i37EEA6A93BCE25C0.png[/img] [h2][b][i]UPDATE: Contest information below![/i][/b][/h2][h2]Nearly 50 percent of Americans don’t use antivirus software[/h2] That’s right; something as basic as installing internet security software (which we all know we’re supposed to use) is completely ignored by about half the US. You’d be amazed how common this and other risky online behaviors are. We did a survey of people’s internet habits across the United States, and the numbers aren’t pretty. For reference, some very common (and very risky) online behaviors include: [list] [*]Not using antivirus software [*]Sharing your account passwords [*]Using too-simple passwords, or reusing the same password for multiple accounts [*]Not using an ad or pop-up blocker [*]Opening emails, clicking links, and downloading files from unknown sources [*]Not installing security on mobile devices[/list][h2]
Nastiest Malware Q&A + Vote for this year's Nastiest!Nastiest Malware
Welcome to another spooktacular Q&A. I’ve just returned from braving the darkest corners of the web to discover the nastiest malware of 2021. I’ll be available until Halloween to answer your questions on the worst infections featured in our latest Nastiest Malware. Add your questions in the comments below.AS PART OF OUR ONGOING COMMUNITY CONTEST - THIS WEEK ONLY WE’LL BE GIVING AWAY A LEGO X-WING FIGHTER TO A RANDOM COMMENTER ON THIS POSTHelp me community members, you’re my only hopeIf you don’t have any questions then we invite you to cast your vote for the malware that you think is the NASITESTMake sure to take our Nastiest Malware Quiz to test your knowledge.
Our latest OpenText Cybersecurity Threat Report is finally here! Cybersecurity professionals were kept on their toes throughout 2022. Russia’s invasion of Ukraine sent shockwaves through organized cybercrime and disrupted ongoing operations by REvil and Conti. Global law enforcement continued to aggressively target threat actors, including the Hive ransomware gang. And discovery of critical vulnerabilities and exposures (CVE) continued at a record pace, with nine CVEs published with scores of 9 or higher. Our report is full of great insights. Some key findings include:The Middle East, Asia, and South America were the regions with the highest percentage of infections. 55.6% of consumer PCs were infected more than once, and 19.9% infected more than 5 times. Facebook was most often impersonated company in phishing attacks. During 2022, 84% of ransomware attacks now include leak sites The year-end average for ransomware payments in 2022 has skyrocketed to over $400,000With Ransomware now t
Today, we're celebrating a technological innovation that’s integral to our everyday life but often goes unnoticed: The Barcode! Yes, you heard it right! It's National Barcode Day! This special day is celebrated on June 26th each year, honoring the day in 1974 when the first barcode was officially used on a pack of Wrigley's Juicy Fruit gum at a supermarket in Troy, Ohio. This little pack of gum made history, and its scanned barcode resides at the Smithsonian National Museum of American History today. Could you imagine going back to these prices? Believe it or not, barcodes have a fascinating history. Their conception traces back to 1948, when a local grocery-store owner asked Drexel Institute of Technology in Philadelphia for a system to automatically read product information during checkout. This led to the birth of the barcode, invented by Norman Joseph Woodland and Bernard Silver. The first barcode was a bullseye symbol made up of a series of concentric circles – quite a departure f
I discovered Webroot by sheer accident. I have been a Norton user for many years. About a week ago I upgraded to Norton 360 Premier. With Norton, I am all too familiar with the amount of time it takes to complete routines, such as scans and backups, but I do consider it to be good software. While doing some research for the best internet security programs (I did a search on Cnet) I came across Webroot. The contrast between Norton and Webroot intrigued me, so I purchased Webroot Secure Anywhere Complete. I wanted to compare the differences between the Norton and Webroot software. Much to my surprise, I learned that I could run Norton and Webroot on the same machine without creating conflicts. So, that's precisely what I did ... I installed both programs. Much to my surprise, they seem to be functioning well, with no glitches or slowing down of processes. I am told that Webroot is non-intrusive, which allows it to function, and not compete, with Norton. So far, this seems t
"For technical support inquiries that require immediate assistance, please use [url=http://www.webrootanywhere.com/support]the official Webroot support system[/url]." It took hours to get the first answer and after around 30 posts conversation I did not get the answer for a simple question: Where is safe download link (https) and the control sum of the file available? Instead after thet extreme waste of time that's what I get: "I have posted your suggestions to the developers, another thing that you can do to get more people looking at your suggestions is if you join the Webroot Community you can go to the ideas exchange and then post your idea, if you get enough votes then the developers will add that to the top of their list of things that they can change with the software. Below is a link to our community. [url=http://community.webroot.com/]http://community.webroot.com/[/url]" "Again I am sorry for any confusion, I can se
We welcome the [url=https://www.webroot.com/]Webroot[/url] scanner to VirusTotal. This is a machine learning engine from the US. In the words of the company: [i]"[/i][i]Webroot SecureAnywhere Business Endpoint Protection is a cloud-driven anti-malware solution and was the first next generation solution to offer a full replacement to conventional AV when launched in 2011.[/i] [i]Rather than rely on static signatures to identify malicious files and process, Webroot uses real-time monitoring and analysis of the events occurring within a device. Then, by using the extensive resources of cloud-based computing, threat and behavioral intelligence, Webroot is able to predict with negligible false positives any signs of malicious behavior. Windows PE files submitted to VirusTotal will be processed by the Webroot PE Scanner, non-PE files will not be scanned.”[/i] Webroot has expressed its commitment to follow the [url=http://www.amtso.org/recommendations-when-including-detection-technolo
So, if you were wondering what a Webroot sponsored race car might look like, I threw together quick rendering on iRacing. It is hard to read from this angle, but the text on the decklid reads "The Fastest Security on Earth." [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/1980i3E8F5FDFFA5BAC91.jpg[/img][img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/1982iFDE2E43C871DA2B0.jpg[/img]