We’re only just beginning to understand how mass data surveillance systems and data privacy impacts us. Will GDPR-like regulation come to the U.S. in 2019? It will require time to craft legislation, achieve some level of adoption, and put it up for a vote—but what’s next?
This blog covers DNS basics, advantages, limitations, and scalability insights for how DNS filtering contributes to a strong, scalable security foundation.
Unfortunately, protecting yourself against malicious threats online is constant battle in this day and age. Security researchers and media outlets have a seemingly never-ending list of topics and events to cover—driving a constant pressure and awareness that we’re not safe online.
Continuing with our series on bias, in this blog, we explore editorial bias and the challenges it presents in accurately categorizing forms of web content.
zvelo AI Architect, Daniel DeMillard, attended the NeurIPS 2018 conference in Montreal. In this blog, he shares trends, insights, and predictions for 2019.
2018 was a wild year for cybersecurity, ad tech, and the internet in general. In this blog, we explore the significant trends and security challenges that are likely to impact us in 2019 and beyond.
Category mappings provide flexibility and customization of URL categorization data—delivering advanced control for web filtering, parental controls, brand safety, ad fraud prevention, as well as other applications digital advertising, and more…
Learn about zvelo’s unique hybrid approach to web content categorization and malicious detection. With over 20 years of experience and partnerships with some of the world’s leading anti-virus, MSSPs, and communications companies—zvelo’s next-generation approach achieves industry-leading coverage and accuracy for end users worldwide.
Malicious Cryptocurrency Mining, or Cryptojacking, is the unauthorized use of a user’s device to mine cryptocurrencies. This article covers primary infection methods and tips for identification and prevention of cryptomining malware.
An internationalized domain name (IDN) homograph attack is a method of deceiving computer users about the remote computer they’re communicating with. It exploits the fact that many characters are homographs, meaning they look alike. Homographs allow a malicious party to create an IDN that appears very similar to an established domain, which can then be used to lure users to the new website.