For the second straight year, zvelo’s IoT Security Platform ranked among the finalists in ECD’s Innovation Awards for next-generation IoT frameworks aimed at securing business and residential networks from nefarious Internet of Things devices.Details
Protect yourself from targeted phishing attacks, malware, spyware, and more. Bad actors and their tactics continue to become more and more sophisticated. Ensure that you change default passwords, always use encryption, learn about safe browsing habits, and maintain security for your home or business network.
Over many years or testing, trial and error, zvelo ultimately determined that a human-machine “hybrid” approach to classification produced the best outcomes. The Human element provided the verifications necessary for the highest levels of accuracy, while machines (ie. AI/ML models and calculations) provided the scaling necessary to deal with the incredible volumes of new URLs and content being published at an increasing rate.
As discussed in a previous blog, DNS RPZ provides IT teams and network administrators with a “DNS configuration layer”, or rewrite module, to effectively handle DNS responses with the open source domain name system software, BIND.
First off, let’s make it clear that there is nothing inherently malicious about the act of cryptocurrency mining. Rather, over the past couple of years cybercriminals and bad actors have leveraged existing exploits and found unsecured hardware to implant Cryptocurrency Mining code and steal CPU/GPU cycles from computer owners and website visitors without their knowledge. These activities are what we refer to as “Malicious Cryptocurrency Mining”.
Over the past decade, the use of “clickbait” ads has become the norm in order to entice viewers to click on the ad and drive traffic to a publisher. Web surfers have grown accustomed to seeing the same types of clickbait ads and sponsored stories like the ones shown below with sensational headlines about curing cancer, stopping aging, improving your sex life and more.
In a recent article published by IT Briefcase—zvelo Security Analyst, Louis Creager, outlined and describes one of the most prominent trends threatening router networks around the world. Ubiquitous as they are in our households, relatively few consumers are conscious of the firmware running on their home routerDetails
One of the largest security gaps in 2018—one that leaves devices open to malware, botnets, and use in DDoS attacks—is the lack of commitment from router and gateway manufacturers. But what is the incentive for OEMs to build the infrastructure and systems to maintain and update device firmware even after just a few years?Details
Last week, we announced that we will be extending zveloDB™ URL categorization support to include eight (8) new categories. The new categories represent a number of emergent topics and threats including Cryptocurrency, Cryptocurrency Mining, Fake News, Terrorism, and more.
So what does IoT Security mean in a rapidly growing device ecosystem? Chuck Martin, Host of The Voices of IoT podcast, and zvelo CEO, Jeff Finn, sat down to discuss the current state of security in the exploding IoT market.Details