An internationalized domain name (IDN) homograph attack is a method of deceiving computer users about the remote computer they’re communicating with. It exploits the fact that many characters are homographs, meaning they look alike. Homographs allow a malicious party to create an IDN that appears very similar to an established domain, which can then be used to lure users to the new website.
In a previous blog, we explored the important differences between base domains and full path URLs. In this post, we wanted to take a step back and cover the basics—the individual structural elements of a URL (Uniform Resource Locator).
As more and more companies are pursuing “Data as a service” or “DaaS” business models, we wanted to share our experiences on the DaaS business model, with a specific focus on the challenges of Intellectual Property Rights (IPR) protections for DaaS data.
Over the past several years, there’s been a significant increase in mobile phishing attacks—particularly targeting enterprises. In this blog, we cover 9 tips and strategies to improve your security against mobile phishing attacks.
Over the years, cybercriminals have deployed increasingly sophisticated scams to deceive users of payment processing systems—particularly small and medium sized business owners—into compromising their accounts by unknowingly divulging account credentials. Here’s an example of a recent phishing campaign from Fall 2018 targeting Stripe users.
This year for National Cybersecurity Awareness Month, we thought we’d take a look back at the original IPAD. No, not the popular tablet from Apple awaiting a design refresh—and leaving tech enthusiasts crawling through rumor sites. No, we’re referring to the Internet Protocol Adapter (IPAD)—the next-generation all-in-one security and gateway device for accessing Bulletin Board Systems and online services from the 1990’s.
A trend forming among newly identified phishing URLs shows bad actors sending fraudulent emails informing Apple ID users of outdated Apple ID information or problems with billing. The emails and internal links attempt to deceive Apple ID users into “verifying” account information. When the user proceeds to log in, the form handing over access credentials to their accounts.
Unless you are living under a rock, you are probably very familiar or at least aware of the purported bias in the news. Depending on your political leanings, you may have strong opinions and ideas about the veracity of your news sources (and those you don’t favor).
As a web content categorization company, we are intensely focused on the trends in the types of content being published on the web, how this content is accessed, used and shared, who is publishing the content, and hundreds of other details that goes into our efforts to provide the market’s best web categorization services.
Over many years or testing, trial and error, zvelo ultimately determined that a human-machine “hybrid” approach to classification produced the best outcomes. The Human element provided the verifications necessary for the highest levels of accuracy, while machines (ie. AI/ML models and calculations) provided the scaling necessary to deal with the incredible volumes of new URLs and content being published at an increasing rate.