See any stories that catch your interest? What would you like to see in the future? Let us know in the comments below!
Crime and Crypto: An Evolution in Cyber Threats
Cybercriminals are constantly experimenting with new ways to take money from their victims. Their tactics evolve quickly to maximize returns and minimize risk. The emergence of cryptocurrency has opened up new opportunities to do just that. To better understand today’s threat landscape, it’s worth exploring the origins of cryptocurrencies and the progress cybercriminals have made in using it to advance their own interests.
See the full article here.
_____________________________________________________
Join the WiFi Security Beta!
Webroot is introducing a new product to our award-winning lineup of security products: Webroot WiFi Security. As a virtual private network (VPN) app, Webroot WiFi Security will help protect users on any device or network, especially unsecured public WiFi.
Like all our products, this latest addition to the Webroot family will include advanced Webroot BrightCloud Threat Intelligence to provide the most robust VPN service on the market and the most comprehensive, up-to-the-minute protection for our customers.
See the full article here.
____________________________________________________
REDDIT - We had a security incident. Here's what you need to know
The Kronos banking Trojan was first discovered in 2014 21] and was a steady fixture in the threat landscape for a few years before largely disappearing. Now a new variant has appeared, with at least three distinct campaigns targeting Germany, Japan, and Poland respectively, to date.
In April 2018, the first samples of a new variant of the banking Trojan appeared in the wild w2]. The most notable new feature is that the command and control (C&C) mechanism has been refactored to use the Tor anonymizing network. There is some speculation and circumstantial evidence suggesting that this new version of Kronos has been rebranded “Osiris” and is being sold on underground markets. In this blog, we present information on the German, Japanese, and Polish campaigns as well as a fourth campaign that looks to be a work in progress and still being tested
See the ful article here.
_____________________________________________________
The Year Targeted Phishing Went Mainstream
A story published here on July 12 about a new sextortion-based phishing scheme that invokes a real password used by each recipient has become the most-read piece on KrebsOnSecurity since this site launched in 2009. And with good reason — sex sells (the second most-read piece here was my 2015 scoop about the Ashley Madison hack).
But beneath the lurid allure of both stories lies a more unsettling reality: It has never been easier for scam artists to launch convincing, targeted phishing and extortion scams that are automated on a global scale. And given the sheer volume of hacked and stolen personal data now available online, it seems almost certain we will soon witness many variations on these phishing campaigns that leverage customized data elements to enhance their effectiveness.
See the full article here.
_____________________________________________________
See what people have been saying about us
- "Years ago we had trouble with antivirus programs not working or slowing our computer down. Since we switched to Webroot we have not had one problem that is impressive, thank you Webroot!"
- "Love it! Does the job well and is economic."
- "This is a powerful suite of protections with an affordable price. The tech support is superb too. I will be keep this for many years."