📊 2023 OpenText Cybersecurity Threat Report
News, Announcements, Tech Discussions
[u] Date Event Location [/u] Sept-18 ConnectWise User Groups – NW Connectors [url=http://www.connectwise.com/landings/user-group-2015/]http://www.connectwise.com/landings/user-group-2015/[/url] Seattle Sept-24 Ch
[b]Adobe Flash Player 21.0.0.213[/b] [b]Release note: [/b][url=https://helpx.adobe.com/flash-player/release-note/fp_21_air_21_release_notes.html]https://helpx.adobe.com/flash-player/release-note/fp_21_air_21_release_notes.html[/url] Windows, Firefox, Safari, Opera - NPAPI [url=http://fpdownload.adobe.com/get/flashplayer/pdc/21.0.0.213/install_flash_player.exe]http://fpdownload.adobe.com/get/flashplayer/pdc/21.0.0.213/install_flash_player.exe[/url] Windows, Internet Explorer - ActiveX [url=http://fpdownload.adobe.com/get/flashplayer/pdc/21.0.0.213/install_flash_player_ax.exe]http://fpdownload.adobe.com/get/flashplayer/pdc/21.0.0.213/install_flash_player_ax.exe[/url] Windows, Chromium-based browsers - PPAPI [url=http://fpdownload.adobe.com/get/flashplayer/pdc/21.0.0.213/install_flash_player_ppapi.exe]http://fpdownload.adobe.com/get/flashplayer/pdc/21.0.0.213/install_flash_player_ppapi.exe[/url] Uninstall tool [url=http://download.macromedia.com/get/flashplayer
[img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/10376i1EBEB4F33A0B0A10.jpg[/img]Anyone who's visited the Webroot community will recognize [user=758][/user] He's the most senior VIP, the only person at the Silver VIP level, and he has a wealth of knowledge about Webroot and computer security. TripleHelix is always willing to lend a hand and share what he knows. I invited him to do a little interview so we could learn more about him and of course he agreed! [b]Tell us a little bit about yourself?[/b] I live in Oshawa, Ontario, Canada about 30 miles east of Toronto and I've lived here my whole life. I’m married; it will be 16 years this year. My wife Lisa is my best friend and a great person. She supports me with all the time I've spent online helping people on many security related forums over the past 15 years. We have 3 chihuahuas. [b]How did you discover the Webroot community?[/b] That’s an easy one.
As many of you know, because of Webroot's unique way of identifying threats, it has never officially been included in public tests. Previous test methodologies simply haven't been devised to test Webroot according to the way it works to detect and block threats.While still a work in progress, we’re happy to announce our first public testing in SE Labs Small Business Endpoint Protection Oct-Dec 2020. The result was a AAA rating for Webroot.It's important to note that these results are only achieved when the new Script protection component of the Webroot Evasion Shield is activated. If you have yet to enable this feature, you can find directions for how to do so here.
[img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/10160i20BDB8D1ED2DF156.png[/img] [b]You've got (spam) mail.[/b] Several AOL users are complaining on Twitter that their email accounts have been hacked and are being used to send out spam to others. Multiple users have said that their accounts have been affected despite not being used in a long time. Among them is Los Angeles Times Food Editor Russ Parsons. "I've gotten a couple of emails from friends telling me that my AOL account had been hacked and that they were getting spammed by it. The thing is, that account has been closed for at least two years," Parsons said in an email. [url=http://www.latimes.com/business/technology/la-fi-tn-aol-hacked-email-phishing-twitter-20140421,0,2040533.story]Full Article[/url]
There has been a massive data breach impacting over 1.8 million users of the Ubuntu operating system this weekend. Canonical, the lead developers of the Ubuntu Linux-based operating system, has admitted that its online forums were not just defaced this weekend, but also that hackers managed to steal every users’ email address, password and username from the Ubuntu Forums database. The first clue that anything was amiss was when hackers posted a (hard-to-miss) message on the Ubuntu Forums homepage of a penguin holding a sniper’s rifle: [b]Full Story -[/b] [url=http://grahamcluley.com/2013/07/ubuntu-forums-hack/]http://grahamcluley.com/2013/07/ubuntu-forums-hack/[/url]
[i][url=http://www.pcadvisor.co.uk/downloads/3329161/webroot-secureanywhere-complete-2013-v80040/]Webroot SecureAnywhere Complete 2013 is the company's high-end, do-everything security suite, packed with essential features and functionality.[/url][/i] [i] [/i] Good, very glowing review from PC Advisor. :D
Here's some shots of our booth up and ready to go: [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/21832i8D86FD6A56E0DBF6.jpg[/img] [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/21833i9715BF85F1D735E0.jpg[/img] [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/21834i921CECFEF0EBF026.jpg[/img] [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/21835i8EA10A954A4EE858.jpg[/img] [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/21836i19C1F165E496ECBA.jpg[/img]
[b]During the past few months, advancements in CryptoLocker put ransomware on the public's radar in a major way.[/b] But according to researchers at Trend Micro, enhancements in the world of ransomware have not stopped as the year as 2013 has come to a close. According to the company, a piece of ransomware they believe is a variant of CryptoLocker has the ability to now spread through removable drives. This update is significant because it has not been seen in other variants and the added propagation routines means the malware can easily spread, according to Trend Micro. "Aside from its propagation technique, the new malware bears numerous differences from known CryptoLocker variants," [url=http://blog.trendmicro.com/trendlabs-security-intelligence/new-cryptolocker-spreads-via-removable-drives/]blogged Abigail Pichel of Trend Micro[/url]. "Rather than relying on a downloader malware—often UPATRE— to infect systems, this malware pretends to be an activator for various software such a
Well this is a step in the right direction, for corporate users at present and it is looking at sometime in 2015 for it's release. by [url=http://nakedsecurity.sophos.com/author/johnhawes/]John Hawes[/url] on September 5, 2014 [img]http://sophosnews.files.wordpress.com/2014/09/ss_170-biometrics-veins-146325689.jpg?w=640[/img] [i]"Barclays bank has [url=http://www.bbc.co.uk/news/business-29062901]announced plans[/url] to introduce biometric authentication based on [url=http://www.barclays.com/news/2014/August/barclays-first-in-uk-to-launch-new-biometric-reader-for-customer.html]vein patterns in fingers[/url] for its UK business customers.[/i] [i]Authentication is as much in the news as ever, with the latest [url=http://nakedsecurity.sophos.com/2014/09/01/jennifer-lawrence-rihanna-98-other-celebs-nude-photos-leaked-online/]naked celebrity mega-scandal[/url] highlighting once again the weakness of online authentication systems.[/i] [i]Banks are particularly interested
One woman's struggle to avoid being identified as pregnant while using the Internet and making online purchases: [url=http://time.com/83200/privacy-internet-big-data-opt-out/]http://time.com/83200/privacy-internet-big-data-opt-out/[/url]
Everyone loves gifts for the holidays. And Webroot and Carbonite customers are no different! We’re giving away a new gift every day during our special 12 Days of Gifts holiday promotion. All you have to do is follow, reply, share, retweet, like or sign up for a new account and you’ll be automatically entered.Here’s what we’re giving away: 12 Days Of Gifts:Day 1: Set of 4 figurines and group buttonDay 2: Notebook and penDay 3: Tote bag and padfolioDay 4: Lunch bagDay 5: Glass cleaner and webcam coverDay 6: SocksDay 7: Power bank and PopSocketDay 8: Tech pouchDay 9: Sticky notes and fidget spinner penDay 10: Hand sanitizerDay 11: Special edition gold MalwareWolf + buttonDay 12: Set of 4 figurines and group button To be eligible to enter all you have to do is:Sign up for a Webroot Community account. Leave a relevant comment about the subject matter to the “12 Days of Gifts” article (comment below) on the Community; or Leave a relevant comment about the subject matter to the Modular Malwa
"[b](CNN)[/b] -- A malware attack hit Yahoo's advertising server over the last few days, affecting thousands of users in various countries, an Internet security firm said." "In a blog post, Fox-IT said Yahoo's servers were releasing an "exploit kit" that exploited vulnerabilities in Java and installed malware." ""Given a typical infection rate of 9%, this would result in around 27,000 infections every hour," the company said. "Based on the same sample, the countries most affected by the exploit kit are Romania, Great Britain and France. At this time it's unclear why those countries are most affected, it is likely due to the configuration of the malicious advertisements on Yahoo."" [url=http://www.cnn.com/2014/01/05/tech/yahoo-malware-attack/index.html?hpt=hp_t2]Full Article[/url] Java exploits have long been a target of malware authors, making it essential to keep your devices up to date. According to some references, the rate of infec
A serious vulnerability, which gives saboteurs the means to take over victims' accounts, plagued eBay's website for at least several months, a researcher revealed. According to Paul Moore, a UK-based IT consultant, an eBay page where users update their profiles remained vulnerable to cross-site request forgery (CSRF) attacks long after he first notified the company about the issue in August. Last Friday, security news service Threatpost published an article on the threat, including email correspondence from Moore, which said he'd “given up [on] asking eBay” to remediate the issue and was now focused on educating users. In September, Moore [url=http://ramblingrant.co.uk/2013/09/16/ebay-security-expose-2/]began blogging[/url] about the vulnerability. On Monday, SCMagazine.com followed up with Moore, who said via email that he was aware that eBay had “made some changes” that afternoon to fix the issue. Moore added, however, that he planned to re-test whether the problem still impacted
[b]Improvements and fixes[/b] This security update includes quality improvements. No new operating system features are being introduced in this update. Key changes include: [list] [*]Addressed issue with Surface Hub devices waking from sleep approximately every four minutes after the first two hours. [*]Addressed issue where autochk.exe can randomly skip drive checks and not fix corruptions, which may lead to data loss. [*]Addressed an issue where Microsoft Edge users in networking environments that do not fully support the TCP Fast Open standard may have problems connecting to some websites. Users can re-enable TCP Fast Open in about:flags. [*]Addressed issues with Arc Touch mouse Bluetooth connectivity. [*]Security updates to Microsoft Edge, Internet Explorer, Microsoft Graphics Component, Windows SMB Server, Windows COM, Microsoft Scripting Engine, Windows kernel, Windows Server, and the .NET Framework.[/list] If you installed earlier updates, only the new fixes contained in this
[b]Microsoft's prediction: Ransomware like Cryptolocker will hit harder in 2014[/b] [b] [/b]My (explanoit's) take: In a post to Microsoft's Security Blog on December 11th, Microsoft makes it clear it thinks ransomware is a big deal. It's on a list of 8 major predictions their top security employees have for the coming year 2014. Cryptolocker has already shown the incredible danger this threat poses to users and businesses in one of the most interesting developments of 2013. Ransomware has always had a place, but the implementation of well architectured cryptography and Bitcoin as a minimally traceable way to extract funds makes ignoring it now impossible. Personally, I have heard from PC repair shop and IT support businesses saying they have had many customers devastated by Cryptolocker. In addition, someone I have spoken who work closely with large corporations and the government regarding cybercrime says that officials are serious about this surging class of threat. Com
[b]BROOMFIELD, CO – September 17, 2015[/b] – [url=http://www.webroot.com/us/en/]Webroot[/url] today announced it has been named the recipient of the [url=http://www.webroot-iot.com/wp-content/themes/cloudstrap/pdf/Webroot-Award-Write-Up.pdf]2015 North American Cybersecurity for Robotics & Industrial Control Frost & Sullivan Product Leadership Award[/url]. The Frost & Sullivan Product Leadership Award recognizes Webroot for its comprehensive and next-generation approach to IoT cybersecurity, and acknowledges Webroot’s success in delivering innovative technologies that address the considerable cybersecurity threats that will target the Industrial Internet of Things (IIoT). [url=http://www.webroot.com/us/en/company/press-room/releases/frost-and-sullivan-recognizes-webroot-for-product-leadership-in-iot-cybersecurity]Full press release here.[/url] Here's a couple photos from the award ceremony: [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment
[i][b]Parents need to be aware of this one.[/b][/i] [b]May 8, 2015 By [url=http://securityaffairs.co/wordpress/author/paganinip]Pierluigi Paganini[/url][/b] According to the Vancouver police who launched the warning, the Game of 72 is a challenge among teenagers to vanish for 72 hours. [quote][i]“Essentially, children are daring each other to ‘go dark’ for 72 hours.””To kids, going dark for 72 hours means to make themselves go missing. Not just off social media, but missing from society for three days.” reported [/i][i][url=http://walkingthesocialmediabeat.com/2015/05/07/game-of-72/]Walkingthesocialmediabeat.com[/url][/i][i].[/i] [/quote]The rules of the Game of 72 are simple, the youngster who receives the message is not allowed to contact anyone for three days. [i]“The greater the hysteria your disappearance causes the bigger you win.” [/i][i][url=http://www.cknw.com/2015/05/06/warning-from-vancouver-police-abou/]reported the cknw.com[/url][/i]
[b]How to spot fake tech support calls from Norton, Microsoft, and other tech brands[/b] [b][img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/31107i1958BFDDBD51F45D.jpg[/img][/b][b] [/b] Tech companies on making unsolicited calls to customers: [list] [*][b]Norton/Symantec[/b]: Doesn’t make unsolicited calls, nor will it charge customers for tech support. Report Norton imposters at [url=https://support.norton.com/]support.norton.com[/url]. [*][b]Microsoft[/b]: Won’t call you unless you call it. Microsoft [url=https://blogs.microsoft.com/on-the-issues/2017/05/18/fight-tech-support-scams/]has a team fighting tech-support fraud[/url]. Report Microsoft scams at [url=http://microsoft.com/reportascam]microsoft.com/reportascam[/url] [*][b]Webroot[/b] (maker of SecureAnywhere software): “[url=https://www.webroot.com/blog/2017/04/04/phone-spoofing-unpacked/]Webroot teammates DO NOT make unsolicited outbound calls to customers[/url].” [*][b]Dell[/b]: “Del