Webroot delivers data, identity and threat protection
Posted on 08 October 2013.
Webroot released the latest updates to its Webroot SecureAnywhere portfolio. The latest release brings new detection technology to block emerging malware and phishing attacks more quickly, a completely redesigned interface for easy monitoring and control, and extended platform support to unify protection across PCs, Macs, and Android and iOS devices.


Other enhancements include web content filtering, an expanded management website, advanced user authentication, and integration of the Webroot Backup & Sync with the Windows Explorer environment.

Cloud-based Webroot SecureAnywhere threat detection offers connected consumers an alternative to the traditional security solutions that have proven ineffective against today's malware, and caused significant performance slow-downs on the devices they were meant to protect.

Phishing attacks often spoof legitimate sites, and most phishing sites are only active for a few hours, disappearing after they've obtained the target's banking credentials, passwords or other sensitive data. This makes such a major security risk incredibly difficult to track.

Webroot SecureAnywhere protection introduces real-time anti-phishing technology to quickly analyze a website when it is accessed by a user and automatically block it if it is a phishing site.

Webroot has introduced a new threat detection engine called Infrared. Utilizing data from the Webroot Intelligence Network (WIN) cloud security service, Webroot Infrared analyzes unknown files by correlating their behavior and origin, and then makes an assessment of the associated risk before the file is allowed to run. The Webroot Infrared engine also customizes protection to the individual device based on a combined analysis of the operating system, applications, and prior threats which have been observed.





Spotlight

Android Fake ID bug allows malware to impersonate trusted apps

Posted on 29 July 2014.  |  Bluebox Security researchers unearthed a critical Android vulnerability which can be used by malicious applications to impersonate specially recognized trusted apps - and get all the privileges they have - without the user being none the wiser.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Jul 29th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //