Month: March 2017

Webroot – South Africa : Next-Generation Endpoint Protection & Threat Intelligence

Webroot – South Africa : Next-Generation Endpoint Protection & Threat Intelligence

Business Security for Peace of Mind and Freedom No Conflicts: Runs alongside other security software so you don’t have to uninstall anything to deploy or try it. Security for Servers, VMs, PCs, and Mac devices. No Conflicts Runs alongside other security software. No need to uninstall existing protection just to give us a try. No […]

How much does it cost to buy 10,000 U.S.-based malware-infected hosts?

How much does it cost to buy 10,000 U.S.-based malware-infected hosts?

How much does it cost to buy 10,000 U.S.-based malware-infected hosts? Earlier this month, we profiled and exposed a newly launched underground service offering access to tens of thousands of malware-infected hosts, with an emphasis on the fact that U.S.-based hosts were relatively more expensive to acquire, largely due to the fact that U.S.-based users […]

Behind the Scenes with Ransomware

Behind the Scenes with Ransomware

Behind the Scenes with Ransomware Locky (.osiris) O Locky, Locky! Wherefore art thou, Locky? Alas, could Locky be no more? At the beginning of 2017, data from the field suggested potential Locky infections had decreased dramatically, so we were hoping it was on its way out. Unfortunately, Locky returned with a vengeance, though it had […]

The Internet of Toys

The Internet of Toys

The Internet of Toys The convenience of having some kind of internet connection on more and more of the devices we use each day is undeniable. However, without proper security vetting, this convenience may come at a hefty price. In the past year alone, we’ve seen millions of routers, DVRs, IP cameras, cars, and more […]