See any stories that catch your interest? What would you like to see in the future? Let us know in the comments below!
Don't be phooled: 10 phishing techniques to look out for
In 2016, American businesses suffered half a billion dollars a year in losses from phishing attacks with the average cost at $1.6 million each. These numbers are alarming evidence that just one click can cause significant financial and reputational damage to your brand. And since studies show that a staggering 30 percent of phishing emails get opened, it’s no wonder that they consistently rank as the top cyberattack vector.
Despite being one of the oldest cyberattacks in the book, phishing remains so popular because it’s a highly effective means of exploiting the weakest link in the cybersecurity chain: humans. To make matters worse, hackers have become much more sophisticated in their techniques: no more poorly written, typo-ridden Viagra spam emails and unclaimed heritage scams. Phishing attacks are now highly targeted, dynamic and "hypermorphic," making them increasingly difficult for both humans and machines to detect.
See the full article here.
_____________________________________________________
Windows 10 Tip: Five keyboard shortcuts you may not know about
If you're running Windows 10, you can use these keyboard shortcuts to manage your tasks more efficiently:
- Hold down Windows logo key + comma to take a quick look at the desktop
- Lock your PC or switch accounts with Windows logo key + L
- Press Alt + Tab to switch between all your open apps
- Minimize all your open windows at once with Windows logo key + M
- And use Windows logo key + Shift + M to restore all minimized windows
Read more about these here.
____________________________________________________
T-Mobile bug let anyone see any customer's account details
A bug in T-Mobile's website let anyone access the personal account details of any customer with just their cell phone number.
The flaw, since fixed, could have been exploited by anyone who knew where to look -- a little-known T-Mobile subdomain that staff use as a customer care portal to access the company's internal tools. The subdomain -- promotool.t-mobile.com, which can be easily found on search engines -- contained a hidden API that would return T-Mobile customer data simply by adding the customer's cell phone number to the end of the web address.
See the full article here.
_____________________________________________________
Vega Stealer - New Malware
There's a new form of malware on the Web that is stealing card information from browsers (among other things) and we've had a few people reach out and ask if they are protected. So to answer that question, yes, so long as you have Webroot installed, we have you covered.
See the full article here.
_____________________________________________________
See what people have been saying about us
- "I have used this on all my computers and have complete confidence in this protection - not a single problem and scanning and utilities are very fast."
- "I just love webroot I've had it for several years now. I just need to put it on my grandson's laptop it'll be my 3rd device. Thank you."
- "I've used many different antivirus programs over the years and this is the first time I've been impressed enough to go out of my way to write a review. Webroot is low profile, light on resources but heavy on features and has consistently been catching many suspicious files that previous programs I've used have been missing. The interface is straightforward and makes it a simple process to manage false positives, something a lot of the other programs turn into a convoluted and frustrating process. I suspect I will be using Webroot for a long time to come. Thanks for a truly great product!"