Estimated Reading Time: 6 minutes My first year at the world’s largest hacker convention, DEF CON, resulted in mixed first impressions. I was amazed and overwhelmed with how large the crowds were. This event seemingly grows in popularity each year and the overly-stuffed conference rooms were proof. With that single point aside, I was able to sit-through some valuable lectures across a wide range of security topics.
The threat landscape continues to evolve—individual and state-backed hackers and agencies become increasingly emboldened to compromise websites and servers, steal CPU cycles for cryptocurrency mining, embark on social engineering efforts to find backdoors, and sway public opinion through fake news and other measures. zvelo provides the most advanced URL/IP categorization database for web filtering, whitelists and blacklists, and residential and business protections against bad actors and malicious online behavior. Explore our network security solutions, cyber threat map, and malicious exploit detection offerings for the most advanced threat intelligence available to OEMs and device manufacturers.
Black Hat – Las Vegas 2011: Report #4 – DARPA’s “Cyber Fast Track” Program Excites the Private Security Sector
Estimated Reading Time: 2 minutes Day one at Black Hat was a hit; so naturally, I looked forward to day two. I sat through a keynote given by Peiter Zatko, better known as “Mudge,” who is a Program Manager at DARPA. Mudge announced a new DARPA initiative called “Cyber Fast Track.”
Estimated Reading Time: 6 minutes After Cofer’s talk, I settled into the “Next-Gen Web” track, which was smaller than the “threat intel” and “bit flow” tracks that drew big crowds. The first topic was on a new web protocol being developed by Google called SPDY (pronounced “speedy”). While interesting, the talk had little to do with security. The speaker was a young German who is heavily involved in the security sector, but his talk simply explained the protocol. I honestly could have gathered most of what he spoke about by reading the documentation and playing with some examples. I was not terribly impressed.
Estimated Reading Time: 3 minutes It’s hard to imagine unsolicited spam getting any more annoying. One way would be to receive it from three different sources and at the same time, which is precisely the type of hybrid spam campaign zveloLABS™ recently unearthed.
Identify and implement a solution that would provide safe Web Browsing protection from malicious and compromised websites for users of the Company’s flagship Mobile Security security offering. Additionally, provide parental…Details
Estimated Reading Time: 2 minutes
An Interview with Jeff Finn, CEO of zvelo
You have the firewall that blocks incoming viruses, worms and spyware. However, if you are not utilizing web filtering, your IT security solution is not complete. Jeff Finn, CEO of zvelo, recently interviewed with Kerio, a zvelo OEM Partner, about zvelo’s web categorization services used in the Kerio Web Filter.
Estimated Reading Time: 3 minutes Viagra’s days may be numbered, at least when it comes to being the drug-of-choice on fraudulent pharmacy websites. Recently, zveloLABS™ noticed a strong shift to another lifestyle drug named Adipex–a brand name alternative to the weight-loss drug phentermine.
Estimated Reading Time: 5 minutes The rapid growth and popularity of social networking sites like Facebook and Twitter has wrought a seismic and lasting change to the Internet. The Web has evolved from a source of static information to a proxy of real world interaction.
Estimated Reading Time: 2 minutes The past weeks have been rife with accusations of privacy infringement against Apple for covertly collecting geo-location information from iPods, iPhones and iPads. Although the collecting of private information by mobile phone manufacturers and 3rd party apps is nothing new, the manner in which Apple stores its data has resulted in criticism from end-users and security experts alike.
Estimated Reading Time: 2 minutes
zveloLABS® researchers recently identified numerous, fictitious 7 News websites promoting work-at-home jobs. These bogus news sites unethically target stay-at-home moms, and falsely promise the discovery of a newfound money-making path in life. Considering the natural appeal of making an honest buck, while being loving care providers at home, it’s certainly easy to understand how unsuspecting mothers could fall for such “recession busting” opportunities.