Digital life protection: How Webroot keeps you safe in a constantly changing world

Digital life protection: How Webroot keeps you safe in a constantly changing world

Nearly every aspect of life is connected to the internet, so protecting your devices, identity, and privacy has never been more critical. Cyber threats are no longer just the occasional virus or suspicious email. Phishing scams, ransomware attacks, data breaches, and identity theft are part of a growing list of online dangers that are a […]
The post Digital life protection: How Webroot keeps you safe in a constantly changing world appeared first on Webroot Blog.

Read More
Is your whole digital life protected? 4 ways to address common vulnerabilities

Is your whole digital life protected? 4 ways to address common vulnerabilities

Cyber threats. Identity theft. Online profiling. Financial fraud. Social media misuse. The list just gets longer. As more aspects of our lives move online and digital devices proliferate, staying safe from threats has become more important than ever. Consider all the connected devices you use for daily tasks—browsing, shopping, banking, gaming, and more. Then think […]
The post Is your whole digital life protected? 4 ways to address common vulnerabilities appeared first on Webroot Blog.

Read More

Spyic – 875,999 breached accounts

In February 2025, the spyware service Spyic suffered a data breach along with sibling spyware service, Cocospy. The Spyic breach alone exposed almost 876k customer email addresses which were provided to HIBP, and reportedly also enabled unauthorised access to captured messages, photos, call logs, and more. The data was provided to HIBP by a source who requested it be attributed to “zathienaephi@proton.me”.

Read More

Cocospy – 1,798,059 breached accounts

In February 2025, the spyware service Cocospy suffered a data breach along with sibling spyware service, Spyic. The Cocospy breach alone exposed almost 1.8M customer email addresses which were provided to HIBP, and reportedly also enabled unauthorised access to captured messages, photos, call logs, and more. The data was provided to HIBP by a source who requested it be attributed to “zathienaephi@proton.me”.

Read More
X