Estimated Reading Time: 3 minutes Over the past decade, the use of “clickbait” ads has become the norm in order to entice viewers to click on the ad and drive traffic to a publisher. Web surfers have grown accustomed to seeing the same types of clickbait ads and sponsored stories like the ones shown below with sensational headlines about curing cancer, stopping aging, improving your sex life and more.
Estimated Reading Time: 5 minutes For the average web surfer, the URL bar provides a magical portal to the interwebz where anything that can be thought of can be entered—revealing the treasures of the internet at the stroke of ‘enter’. For the rest of us, we know it gets much more complicated than that as we slip down the rabbit hole and into OSI, DNS, TLS, HTTPS, subdomains…
Estimated Reading Time: 2 minutes Last week, we announced that we will be extending zveloDB™ URL categorization support to include eight (8) new categories. The new categories represent a number of emergent topics and threats including Cryptocurrency, Cryptocurrency Mining, Fake News, Terrorism, and more.
Estimated Reading Time: < 1 minute In an article on ITPro, Jeff Finn writes about how the state of IoT cybersecurity is reaching a tipping point, forcing IoT device manufacturers to work partners that excel at networking. “The writing on the wall for IoT device manufacturers is to get serious about security and develop fruitful channel partnerships with network technology providers.
Estimated Reading Time: < 1 minute Once you see this vulnerability in action, it’s easy to imagine how easily devices can be exploited. Simple vulnerability hacks and tactics such as this can be used in coordination with home routers, smart speakers, video surveillance equipment, and much more to create havoc.
Estimated Reading Time: 4 minutes Recently, Digiday published an article about the “winners and losers” of the new EU ePrivacy law. As suspected, behavioral targeting is a clear loser due to its reliance on cookie-based targeting. The only winners mentioned seemed to be those outside of the realm of digital advertising.
Estimated Reading Time: 4 minutes What’s Reaper? Reaper (a.k.a IotTroop) is the latest botnet threat which is specifically targeting IoT vulnerabilities. With over 1.2 million devices already impacted, Reaper is the the largest IoT bot attack to date and continuing to grow rapidly. Using multiple C2’s, each with 10s of thousands of unique active IPs daily, Reaper is gaining momentum with each new device it exploits.
Estimated Reading Time: 3 minutes Network security company zvelo Monday unveiled an IoT security offering that uses artificial intelligence to automate the way enterprises discover and profile IoT devices on the network – and detect ones that are compromised.
Estimated Reading Time: 2 minutes zvelo Instant Protection (zIP) is a new feature designed to provide fast, up-to-the-minute updates on important category changes and real-time protection from newly identified blockable (adult, porn, hate, criminal, etc.) and malicious (malware, spyware, phishing, compromised, etc.) URLs.
Estimated Reading Time: 2 minutes The introduction of voice-activated smart home solutions – like Amazon Echo and Dot, Google Home, and Apple’s HomePod