Protect yourself from targeted phishing attacks, malware, spyware, and more. Bad actors and their tactics continue to become more and more sophisticated. Ensure that you change default passwords, always use encryption, learn about safe browsing habits, and maintain security for your home or business network.

SpotX Offers Transparency & Inventory Assurance with zvelo

SpotX Announces Support for IAB’s ads.txt to Verify Seller Credentials Leverages zvelo for anti-fraud monitoring as a key authentication vendor to offer transparency and inventory assurance for buyers. Video ad serving platform SpotX has been aggressively taking steps to ensure all inventory available to buyers via its platform is sourced directly from owned-and-operated publishers or…

Verizon Data Breach

Lessons Learned from the Verizon Data Breach

Earlier this week, over 14 million Verizon customers had sensitive user data associated with their Verizon accounts released into the wild.  A third-party vendor had stored the database on an improperly secured cloud server. While this unsecured server was located in the Amazon Web Services (AWS) cloud, the data breach was determined to be a result of human error on the contractor’s part, not any inherent security vulnerability in the AWS cloud.

In The Stack, Jeff Finn, CEO of zvelo, asks whether there are enough incentives for consumers to be concerned about the security of their IoT devices…

For customers purchasing Internet of Things (IoT) devices – a group that either includes or will include just about every one of us soon enough – it’s easy to get excited about the idea of smart light bulbs, speakers, thermostats, power outlets, and a host of other convenient, connected hardware the market offers. The chief selling point of most IoT devices is their functionality and simplicity, enabling us to control or track everything in our lives with our voices or our phones.