Continuing with our series on bias, in this blog, we explore editorial bias and the challenges it presents in accurately categorizing forms of web content.
Protect yourself from targeted phishing attacks, malware, spyware, and more. Bad actors and their tactics continue to become more and more sophisticated. Ensure that you change default passwords, always use encryption, learn about safe browsing habits, and maintain security for your home or business network.
2018 was a wild year for cybersecurity, ad tech, and the internet in general. In this blog, we explore the significant trends and security challenges that are likely to impact us in 2019 and beyond.
Category mappings provide flexibility and customization of URL categorization data—delivering advanced control for web filtering, parental controls, brand safety, ad fraud prevention, as well as other applications digital advertising, and more…
Learn about zvelo’s unique hybrid approach to web content categorization and malicious detection. With over 20 years of experience and partnerships with some of the world’s leading anti-virus, MSSPs, and communications companies—zvelo’s next-generation approach achieves industry-leading coverage and accuracy for end users worldwide.
Malicious Cryptocurrency Mining, or Cryptojacking, is the unauthorized use of a user’s device to mine cryptocurrencies. This article covers primary infection methods and tips for identification and prevention of cryptomining malware.
The Department of Justice this week announced and unsealed charges against eight individuals involved in a massive digital advertising fraud network. Led by the FBI with assistance from a number of companies in the cybersecurity and ad tech industries, “Operation Eversion”, as it has been dubbed, followed and seized infrastructure belonging to the “3ve” ad-fraud scam network.Details
An internationalized domain name (IDN) homograph attack is a method of deceiving computer users about the remote computer they’re communicating with. It exploits the fact that many characters are homographs, meaning they look alike. Homographs allow a malicious party to create an IDN that appears very similar to an established domain, which can then be used to lure users to the new website.
In a previous blog, we explored the important differences between base domains and full path URLs. In this post, we wanted to take a step back and cover the basics—the individual structural elements of a URL (Uniform Resource Locator).
Over the past several years, there’s been a significant increase in mobile phishing attacks—particularly targeting enterprises. In this blog, we cover 9 tips and strategies to improve your security against mobile phishing attacks.
Over the years, cybercriminals have deployed increasingly sophisticated scams to deceive users of payment processing systems—particularly small and medium sized business owners—into compromising their accounts by unknowingly divulging account credentials. Here’s an example of a recent phishing campaign from Fall 2018 targeting Stripe users.