This article will be updated periodically, in support of numerous global online safety awareness campaigns occuring every year – Safer Internet Day (promoted in February), Cyber Security Awareness Month (October),IWF Awareness Day (also in October) and others. During these times, web safety advocates, companies, organizations and professionals worldwide raise awareness about safer and more responsible use of online technologies and mobile devices. Following is a living repository of online resources, guides, tips and entities aimed at helping everyone enjoy worry-free Internet experiences. Additional web safety resources will be hand-picked and added as they are discovered. To possibly be included in this list, or if other online safety resources exist that deserve mention, please feel free to comment below. Including a link and a brief description with each comment helps.
Advanced threat and exploit detection is critical to cybersecurity and network defense. zvelo’s Malicious Detection capabilities empower MSSPs, ISPs, TELCOs, network security providers, and VARs to provide world-class protection. Gain advanced insight with the most accurate URL database for malicious exploit detection to better understand the cyber threat landscape. Categories include Command and Control, Malware, Spyware, Spam URLs, Cryptocurrency Mining, Phishing and Fraud, and more.
Demonstrating the need for increased security against malware and malicious website, reports have emerged of a group of unknown hackers that broke into Bangladesh’s central bank. Once in, they obtained the credentials needed for payment transfers from Federal Reserve Bank of New York and then transferred large sums to fraudulent accounts based in the Philippines…
The cyber arms race just got crazier. You’ve heard of SaaS…DaaS… now there’s MaaS – “Malware as a Service,” empowering and enabling cyber criminals.
The ad tech industry has been reeling for the past 12 months over ad fraud and the industry is starting to come to terms with it. But unfortunately, ad fraud is just the tip (albeit, a very costly tip) of the malicious web. The recent malvertising attack on the Yahoo Network is a painful example…
The Magnitude of the Breach On Thursday, June 4, it was announced that there was a large breach of the Office of Personnel Management (OPM) of the federal government. The Chinese are fingered in the breach, in which about 4 million people’s records were lost in the attack, and the Chinese government denied being responsible,…
The prospect, a leading provider of big data analytics solutions, had identified a need to capture, curate, categorize and visualize the massive amounts of web usage data sets stemming from mobile service providers…Details
Cybercrime against high-profile entities like eBay and Target is on the rise, and the media has conjured up nightmarish scenarios of cyber-criminals going on shopping sprees with our well-earned cash – easily obtained through stolen credit card information. The risks that the general public faces vary and should not be applied equally.
The importance of the Alexa top websites can never be discounted in zvelo’s day-to-day operations. Providing contextual data sets about the Alexa top sites is a vital element for the online advertising market because it can assist in determining the most ideal and brand-safe placement of online ads and other promotional materials.
Given the dynamic nature of the majority of today’s websites, categorization at the full path URL versus the base domain is superior and now required. Parts of a website include the top-level domain (.com, .org, etc.), the base domain (example.com), sub-domain (subdomain.example.com) or sub-path (example.com/page). When categorizing content, it is highly important to recognize exactly what is being classified within a website because content can differ dramatically across full path URLs.