New ransomware CoinVault allows users to decrypt one file for free
Cybercriminals behind a new ransomware program called CoinVault are trying out a new psychological tactic to convince users to pay up -- freebies.
Cybercriminals behind a new ransomware program called CoinVault are trying out a new psychological tactic to convince users to pay up -- freebies.
Cybercriminals are spreading a new file-encrypting ransomware program that's more powerful and resilient than Cryptolocker, a threat recently shut down by the U.S. Department of Justice.
Corporate employees are taking a surprisingly lax approach towards security issues raised by the business use of personally owned mobile devices.
Webroot today released the results of a survey on BYOD that suggests the employee-employer trust gap is widening. The company also created an eight-point "BYOD Bill of Rights" to help bridge that gap while keeping corporate data secure.
More fixes are appearing for a pair of highly dangerous vulnerabilities exposed earlier this month in the Android mobile operating system.
Closing the circle: Why you need to protect endpoints and mobile devices together Endpoint protection has gotten more complicated In this white paper we will discuss: • Why traditional endpoints and mobile devices require overlapping (but not identical) security solutions. • How to enhance the protection of all endpoints by adding web security. • Why today’s threats require that endpoint protection and mobile device protection activities be moved to the cloud. • How Webroot makes it easy to “close the circle” by managing endpoint protection, mobile device protection and web security through one infrastructure.