Protect yourself from targeted phishing attacks, malware, spyware, and more. Bad actors and their tactics continue to become more and more sophisticated. Ensure that you change default passwords, always use encryption, learn about safe browsing habits, and maintain security for your home or business network.

Giving Up Our Privacy and Liking It

Estimated Reading Time: 2 minutes We are constantly reminded of the growing number of privacy concerns from the use of Information and Communications Technology (ICT). Some are quick to blame governments or commercial entities when our personal information is compromised. Very few stop to think whether or not the blame should be pointed at ourselves. To what extent are we as end-users responsible for facilitating our own personal privacy?

To WWW or Not to WWW? – zvelo categorization

Estimated Reading Time: 2 minutes

If one performs the search “use www or not,” well over a billion results in many of the most popular search engines are returned. The focus of each result may differ. For zvelo, the usage is irrelevant because its contextual categorization processes are designed to identify and handle each component of a URL. At a simplistic view, the basic components of a URL are the following:

Top websites are targets for malvertising

Estimated Reading Time: < 1 minute

The importance of the Alexa top websites can never be discounted in zvelo’s day-to-day operations. Providing contextual data sets about the Alexa top sites is a vital element for the online advertising market because it can assist in determining the most ideal and brand-safe placement of online ads and other promotional materials.

WaterHole Attacks – Compromised Websites

Estimated Reading Time: 3 minutes

Instances of large-scale compromises of both private industry and public institutions in 2013 prompted a flurry of activity among security researchers to identify emerging and established threats. Commonly identified as Advance Persistent Threats (APTs), this phenomenon is expected to continue well into the foreseeable future. Fundamental to the spread of these threats is one of their foremost methods of propagation – a water hole attack.

Detecting & Categorizing Websites that Promote Self-Harm

Estimated Reading Time: < 1 minute

zvelo has received many requests from its technology partners who are in the web filtering and parental control sectors to institute and support a new category that can be used to identify websites that promote self-harm behaviors. As a result of such demand, a new “Self Harm” category has been added to the zveloDB® URL database.

Experiment Raises Online Privacy Eyebrow

Estimated Reading Time: < 1 minute

People don’t seem to worry much about privacy when “checking in” to a favorite local restaurant or coffee shop, or from other social media posts that reveal one’s location. What if you were approached by a complete stranger who knew your name and other personally indefinable information within minutes after making an upload? A few socialites got quite the shock after a social media experiment revealed how much personal information can be extracted from publicly viewable status updates.