The threat landscape continues to evolve—individual and state-backed hackers and agencies become increasingly emboldened to compromise websites and servers, steal CPU cycles for cryptocurrency mining, embark on social engineering efforts to find backdoors, and sway public opinion through fake news and other measures. zvelo provides the most advanced URL/IP categorization database for web filtering, whitelists and blacklists, and residential and business protections against bad actors and malicious online behavior. Explore zvelo’s Cybersecurity and threat intelligence data feeds for industry leading malicious and phishing exploit detection and the most advanced cyber threat intelligence available to OEMs and device manufacturers.

A Look Into Apple’s Geo-Location Tracking

The past weeks have been rife with accusations of privacy infringement against Apple for covertly collecting geo-location information from iPods, iPhones and iPads. Although the collecting of private information by mobile phone manufacturers and 3rd party apps is nothing new, the manner in which Apple stores its data has resulted in criticism from end-users and security experts alike.

zveloLABS® Identifies Sites with Work-at-Home Scams

zveloLABS® researchers recently identified numerous, fictitious 7 News websites promoting work-at-home jobs.  These bogus news sites unethically target stay-at-home moms, and falsely promise the discovery of a newfound money-making path in life.  Considering the natural appeal of making an honest buck, while being loving care providers at home, it’s certainly easy to understand how unsuspecting mothers could fall for such “recession busting” opportunities.

Kerio Web Filter Webinar

In this FREE and live Kerio Webinar, industry expert Jeff Finn, CEO of zvelo, will be a guest speaker, taking an in-depth look at the latest innovations and cutting-edge technology found in Kerio Web Filter, including its use of the zvelo’s distributed neural network, zveloNET® (formerly SiteFilter), for the real-time detection, inspection, categorization and verification of ActiveWeb sites collected from the global user community. 

Anatomy of a Modern Compromised Website

In the security community, little attention is paid to compromised websites that don’t serve up malware. The malicious URL lists maintained by the anti-virus companies, by Google, and by nearly every other source of malicious URLs rely on anti-virus to trigger on exploits and malware to determine if a site is malicious. In a few select cases, behavioral analysis may be used to determine if a visit to a website will lead to an infected computer.