Webroot Inc. is a private American company that provides Internet security for consumers and businesses. The company was founded in Boulder, Colorado, US and is now headquartered in Broomfield, Colorado, and has US operations in San Mateo and San Diego, and globally in Australia, Austria, Ireland, Japan and the United Kingdom.

Wikipedia
Webroot
Webroot
Blog Post
  • Reading Time: ~4 min.I had the privilege of giving a keynote on one of my favorite topics, busting myths around artificial intelligence (AI) and machine learning (ML), during DattoCon 2018 this week. Webroot has been doing machine learning for more than a decade and consider this aspect one of our key differentiators for our solutions. However, for many […] The post Parsing the Distinction Between...

Webroot
Webroot
YouTube Video
Webroot
Webroot
Blog Post
  • Reading Time: ~2 min.Apple Bans All Cryptocurrency Mining Apps from App Store Apple has made several policy changes over the last few days that will effectively ban all cryptocurrency mining features from apps in the App Store. This change comes not long after Apple removed an app called Calender 2, which silently began background mining for Monero but […] The post Cyber News Rundown: Apple Bans C...

Webroot
Webroot
YouTube Video
Webroot
Webroot
Blog Post
  • Reading Time: ~3 min.Cyberattacks are on the rise, with UK firms being hit, on average, by over 230,000 attacksin 2017. Managed service providers (MSPs) need to make security a priority in 2018, or they will risk souring their relationships with clients. By following 3 simple MSP best practices consisting of user education, backup and recovery, and patch management, […] The post 3 MSP Best Practic...

Webroot
Webroot
Blog Post
  • Reading Time: ~2 min.The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for all things security. Any questions? Just ask. 92 Million Genealogy Site Accounts Compromised Earlier this week, genealogy and DNA testing site MyHeritage revealed it […] The post Cyber News Rundown: My...

Webroot
Webroot
Blog Post
  • Reading Time: ~3 min.GDPR represents a massive paradigm shift for global businesses. Every organization that handles data belonging to European residents must now follow strict security guidelines and businesses are now subject to hefty fines if data breaches are not disclosed. Organizations around the world have been busy preparing to comply with these new regulations, but many internet […] The p...

Webroot
Webroot
YouTube Video
  • The European Union’s General Data Protection Regulation (GDPR) and Australia’s Notifiable Data Breaches (NDB) have recently come into effect. Webroot surveyed IT Decision-Makers around the world to see if they thought there would be fewer data breaches as a direct result of stronger data protection policies. Learn more about the survey results: https://webroot.com/GDPR. Methodological Notes: T...

Webroot
Webroot
YouTube Video
  • The European Union’s General Data Protection Regulation (GDPR) and Australia’s Notifiable Data Breaches (NDB) have recently come into effect. Webroot surveyed IT Decision-Makers around the world to determine their level of compliance readiness. Learn more about the survey results: https://webroot.com/GDPR. Methodological Notes: The Webroot Survey was conducted by Wakefield Research (https://wa...

Webroot
Webroot
YouTube Video
  • The European Union’s General Data Protection Regulation (GDPR) and Australia’s Notifiable Data Breaches (NDB) have recently come into effect. Webroot surveyed IT Decision-Makers around the world to see if they were ready to comply with GDPR rules requiring disclosure of all personal data collected on individuals within one month of the request. Learn more about the survey results: https://webroo...

Webroot
Webroot
Blog Post
  • Reading Time: ~4 min.Nearly 50% of Americans don’t use antivirus software That’s right; something as basic as installing internet security software (which we all know we’re supposed to use) is completely ignored by about half the US. You’d be amazed how common this and other risky online behaviors are. We did a survey of people’s internet habits across […] The post American Cybercrime: The Riskies...

Webroot
Webroot
Blog Post
  • Reading Time: ~2 min.The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for all things security. Any questions? Just ask. Mercedes Keyless Entry Leads to Car Theft It was discovered this week that criminals are using an […] The post Cyber News Rundown: Hackable Mercedes appear...

Webroot
Webroot
Blog Post
  • Reading Time: ~2 min.The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for all things security. Any questions? Just ask. Comcast Router Bug Leaves Credentials Unsecured Researchers recently found a flaw in the Comcast user authentication process […] The post Cyber News Rundow...

Webroot
Webroot
Blog Post
  • Reading Time: ~2 min.Chili’s Restaurant Reveals Payment Card Breach In the last week, officials have discovered a data breach that affects an unknown number of the chain’s 1,600 restaurants across the country. It is believed that the breach could affect customers who visited the restaurant between March and April of this year, and likely includes all payment information, […] The post Cyber News Ru...

Webroot
Webroot
Blog Post
  • Reading Time: ~2 min.Smartphone apps make life easier, more productive, and more entertaining. But can you trust every app you come across? Malicious mobile apps create easy access to your devices for Android and iOS malware to wreak havoc. And there are many untrusted and potentially dangerous apps lurking around in app stores determined to outsmart your smartphone. […] The post Bad Apps: Protect...

Webroot
Webroot
Blog Post
  • Reading Time: ~2 min.Crypto Mining Makes the Jump to Excel With the recent Microsoft release supporting JavaScript within Excel, it was only a matter of time before the scripting service was manipulated to mine cryptocurrency. Mere hours after the release, the first proof of concept appeared, with easy-to-replicate steps to get CoinHive functioning. While this proof of concept […] The post Cyber N...

Webroot
Webroot
Blog Post
  • Reading Time: ~2 min.Fake tech support scams aren’t going anywhere. In fact, recent data shows this type of social engineering attack is on the rise—with phony tech support calls, emails, and pop-ups peddling the digital equivalent of snake oil to unsuspecting internet users around the world. While many people have grown wise enough to spot the warning signs […] The post Tech Support Scams: From B...

Webroot
Webroot
Blog Post
  • Reading Time: ~3 min.As the EU’s General Data Protection Regulation (GDPR) edges closer, we’re looking back on the five most significant stories during the lead up to its implementation. Read about GDPR’s impact on data security and find out how to get prepared with five steps to compliance. What aspect of GDPR will have the biggest impact on […] The post Cyber News Rundown: GDPR Edition appeared ...

Webroot
Webroot
Blog Post
  • Reading Time: ~2 min.The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for all things security. Any questions? Just ask. Cyberattack Shuts Down Mexico Central Bank Within the past week, several payment systems associated with Mexico’s central […] The post Cyber News Rundown: ...

Webroot
Webroot
Blog Post
  • Reading Time: ~1 min.Our most recent release of the DNS Protection agent provided customers with added features and enhancements designed to improve the overall product experience and its capabilities delivered to end users. We revamped the network detection functionality to improve accuracy and speed for roaming and off-site clients who frequently change networks. We also addressed a variety […] ...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.