Webroot - blog.webroot.com - Webroot Threat Blog
General Information:
Latest News:
[Video] ThreatVlog, Episode 2: Keyloggers and your privacy 26 Aug 2013 | 09:50 pm
Commercial and black hat keyloggers can infect any device, from your PC at home to the phone in your hand. What exactly are these programs trying to steal? How can this data be used harmfully agains...
[Video] ThreatVlog, Episode 1: Tor and Apple exploits revealed 21 Aug 2013 | 01:01 am
What is Tor? Is it really secure? What about the Apple App Store approval process? Are all these applications really looked at? In today’s episode, Grayson Milbourne covers the exploitation of the Tor...
DIY automatic cybercrime-friendly ‘redirectors generating’ service spotted in the wild 19 Aug 2013 | 12:00 pm
By Dancho Danchev Redirectors are a popular tactic used by cybercriminal on their way to trick Web filtering solutions. And just as we’ve seen in virtually ever segment of the underground marketplace,...
Bulletproof TDS/Doorways/Pharma/Spam/Warez hosting service operates in the open since 2009 16 Aug 2013 | 12:00 pm
By Dancho Danchev Operating in the open since 2009, a bulletproof hosting provider continues offering services for white, grey, and black projects, as they like to describe them, and has been directly...
DIY Craigslist email collecting tools empower spammers with access to fresh/valid email addresses 15 Aug 2013 | 08:00 pm
By Dancho Danchev In need of a good reason to start using Craigslist ‘real email anonymization’ option? We’re about to give you a pretty good one. For years, the popular classified Web site has been u...
From Vietnam with tens of millions of harvested emails, spam-ready SMTP servers and DIY spamming tools 14 Aug 2013 | 12:00 pm
By Dancho Danchev How would a cybercriminal differentiate his unique value proposition (UVP) in order to attract new customers wanting to purchase commoditized underground market items like, for insta...
Cybercrime-friendly underground traffic exchange helps facilitate fraudulent and malicious activity 13 Aug 2013 | 12:00 pm
By Dancho Danchev Throughout the last couple of years, the persistent demand for geolocated traffic coming from both legitimate traffic exchanges or purely malicious ones — think traffic acquisition t...
Newly launched managed ‘malware dropping’ service spotted in the wild 12 Aug 2013 | 12:00 pm
By Dancho Danchev Among the most common misconceptions about the way a novice cybercriminal would approach his potential victims has to do with the practice of having him looking for a ‘seed’ populati...
Fake ‘Apple Store Gift Card’ themed emails serve client-side exploits and malware 9 Aug 2013 | 12:00 pm
By Dancho Danchev Apple Store users, beware! A currently ongoing malicious spam campaign is attempting to trick users into thinking that they’ve successfully received a legitimate ‘Gift Card’ worth $2...
One-stop-shop for spammers offers DKIM-verified SMTP servers, harvested email databases and training to potential customers 8 Aug 2013 | 11:00 pm
By Dancho Danchev In a series of blog posts, we’ve been highlighting the ease, automation, and sophistication of today’s customer-ized managed spam ‘solutions’, setting up the foundations for a succes...