Protect yourself from targeted phishing attacks, malware, spyware, and more. Bad actors and their tactics continue to become more and more sophisticated. Ensure that you change default passwords, always use encryption, learn about safe browsing habits, and maintain security for your home or business network.
Once you see this vulnerability in action, it’s easy to imagine how easily devices can be exploited. Simple vulnerability hacks and tactics such as this can be used in coordination with home routers, smart speakers, video surveillance equipment, and much more to create havoc.
Recently, Digiday published an article about the “winners and losers” of the new EU ePrivacy law. As suspected, behavioral targeting is a clear loser due to its reliance on cookie-based targeting. The only winners mentioned seemed to be those outside of the realm of digital advertising.
zvelo Instant Protection (zIP) is a new feature designed to provide fast, up-to-the-minute updates on important category changes and real-time protection from newly identified blockable (adult, porn, hate, criminal, etc.) and malicious (malware, spyware, phishing, compromised, etc.) URLs.
SpotX Announces Support for IAB’s ads.txt to Verify Seller Credentials Leverages zvelo for anti-fraud monitoring as a key authentication vendor to offer transparency and inventory assurance for buyers. Video ad serving platform SpotX has been aggressively taking steps to ensure all inventory available to buyers via its platform is sourced directly from owned-and-operated publishers or…
The introduction of voice-activated smart home solutions – like Amazon Echo and Dot, Google Home, and Apple’s HomePod
Earlier this week, over 14 million Verizon customers had sensitive user data associated with their Verizon accounts released into the wild. A third-party vendor had stored the database on an improperly secured cloud server. While this unsecured server was located in the Amazon Web Services (AWS) cloud, the data breach was determined to be a result of human error on the contractor’s part, not any inherent security vulnerability in the AWS cloud.
A few years ago at a DEFCON conference, an organization called “Let’s Encrypt” lead a session on their new project. Although this group was not well-known at the time, their ambitious goals made me feel that I should hear what they had to say, even if it was just to save money.
Petya is a ransomware campaign that has been updated to take advantage of an exploit named EternalBlue (named this by the NSA as part of their toolset). This exploit takes advantage of a vulnerability in the Server Message Block (SMB) protocol.
For customers purchasing Internet of Things (IoT) devices – a group that either includes or will include just about every one of us soon enough – it’s easy to get excited about the idea of smart light bulbs, speakers, thermostats, power outlets, and a host of other convenient, connected hardware the market offers. The chief selling point of most IoT devices is their functionality and simplicity, enabling us to control or track everything in our lives with our voices or our phones.
About two months ago, I posted a video blog showing how easy it is to obtain unauthenticated root access on a very popular Netgear router. This Netgear vulnerability received overwhelming news coverage and the urgent call went out across the Internet to patch all of their routers ASAP.