We Categorize the Web! zvelo is the industry-leading provider of web content categorization, malicious detection, and the zveloDB URL Database—helping antivirus vendors, web filtering providers, MSPs, CASBs, ISPs, Telcos, device manufacturers, ad tech companies, and others make the internet a safer place for all!

Homograph Attack | Internationalized Domain Name Attack

What is an IDN Homograph Attack and How Do You Protect Yourself?

An internationalized domain name (IDN) homograph attack is a method of deceiving computer users about the remote computer they’re communicating with. It exploits the fact that many characters are homographs, meaning they look alike. Homographs allow a malicious party to create an IDN that appears very similar to an established domain, which can then be used to lure users to the new website.

2018 Stripe Phishing Scam - Fraudulent Login Landing Page

2018 Phishing Campaign Against Stripe Payment Processing Users

Over the years, cybercriminals have deployed increasingly sophisticated scams to deceive users of payment processing systems—particularly small and medium sized business owners—into compromising their accounts by unknowingly divulging account credentials. Here’s an example of a recent phishing campaign from Fall 2018 targeting Stripe users.

Tech Throwback: The Original IPAD

Tech Throwback: Remembering the Original IPAD

This year for National Cybersecurity Awareness Month, we thought we’d take a look back at the original IPAD. No, not the popular tablet from Apple awaiting a design refresh—and leaving tech enthusiasts crawling through rumor sites. No, we’re referring to the Internet Protocol Adapter (IPAD)—the next-generation all-in-one security and gateway device for accessing Bulletin Board Systems and online services from the 1990’s.

2018 Apple ID Phishing Scam

Increase in Mobile Phishing Scams Targeting Apple ID Users

A trend forming among newly identified phishing URLs shows bad actors sending fraudulent emails informing Apple ID users of outdated Apple ID information or problems with billing. The emails and internal links attempt to deceive Apple ID users into “verifying” account information. When the user proceeds to log in, the form handing over access credentials to their accounts.

How to evaluate a web filtering technology or URL database

How To Evaluate a Premium DNS and URL Filtering Technology

We’ve outlined the important considerations and criteria for performing an evaluation of web filtering technologies. Protection, coverage, and accuracy are most important—but we’ll also show you how to prepare test URLs so that you can confidently compare multiple solutions and save time.