Archive for the Malicious Exploit Detection Category






CRN interviews zvelo CEO on New IoT Security Offering to Detect Compromised Devices

CRN interviews zvelo CEO on New IoT Security Offering to Detect Compromised Devices

CRN Exclusive: zvelo Introduces IoT Security Offering To Detect Compromised Devices CRN: News, Analysis, and Perspective for VARs, and Technology Integrators *The following article, by Lindsey O’Donnell, is featured on CRN‘s website and was originally published on October 2, 2017. Network security company zvelo Monday unveiled an IoT security offering that uses artificial intelligence to automate the way enterprises discover and profile IoT devices on the network – and detect ones that are compromised. “Over the past two years, we saw […]

Read more

Looking forward to the DEF CON 25 Hacking Conference

Looking forward to the DEF CON 25 Hacking Conference

Two large annual security conferences are taking place in Las Vegas this week and I will be attending the second one.

Read more

InfoSecurity Magazine Features How IoT Device Discovery and Activity Detection Can Work by Jeff Finn of zvelo

InfoSecurity Magazine Features How IoT Device Discovery and Activity Detection Can Work by Jeff Finn of zvelo

*****The following article, by Jeff Finn, appears as an online article in the Opinion section on InfoSecurity Magazine Home’s web site and was originally published on July 13, 2017. In InfoSecurity Magazine: How IoT Device Discovery and Activity Detection Can Work by Jeff Finn, CEO of zvelo Even as IoT device volume races towards 200 billion by 2020, the vast majority of our connected gadgets still have little or no security features in place – leaving them ripe for […]

Read more

“Why Aren’t IoT Manufacturers Doing More to Prevent Botnet Attacks?” IoT Evolution Magazine Feature News by Jeff Finn, special guest

“Why Aren’t IoT Manufacturers Doing More to Prevent Botnet Attacks?” IoT Evolution Magazine Feature News by Jeff Finn, special guest

*****The following article, by Jeff Finn, appears within the Featured News section of IoT Evolution Magazine’s web site and was originally published on February 23, 2017. Malicious hackers seeking out unsecured devices to add to their botnet armies is not new, but the Internet of Things (IoT) revolution is making their jobs all too easy. According to Cisco estimates, there are 15 billion IoT devices on the market today; IDC and Intel project over 200 billion […]

Read more

zvelo’s CEO, Jeff Finn, offers his opinion on the future of IoT security in InfoSecurity Magazine

zvelo’s CEO, Jeff Finn, offers his opinion on the future of IoT security in InfoSecurity Magazine

Users Can Secure Their IoT Devices; But Will They? *****The following article, by Jeff Finn, appears within the Opinion section of InfoSecurity Magazine’s web site and was originally published on February 15, 2017. On an increasingly massive scale, cybercriminals are repurposing connected Internet of Things (IoT) devices installed within our homes. These hackers use malware to enlist our smart thermostats, speakers, lights, and more as soldiers for their botnet armies – used in coordinated massive […]

Read more

Senior Malicious Detection Researcher at zvelo discusses the Rise of IoT botnet attacks and how to mitigate the threat they pose

Senior Malicious Detection Researcher at zvelo discusses the Rise of IoT botnet attacks and how to mitigate the threat they pose
Senior Malicious Detection Researcher at zvelo discusses the Rise of IoT botnet attacks and how to mitigate the threat they pose. Eric Watkins, Senior Malicious Detection Researcher at zvelo contributes an article in On Internet of Business - Informing IoT and the Connected World *****The following article appears within Internet of Business - Informing IoT and the Connected World's web site and was originally published on January 19, 2017 The meteoric growth of the IoT [...]Read more

An Invaluable Resource Against Data Breaches in the Hacking Age

An Invaluable Resource Against Data Breaches in the Hacking Age

An Invaluable Resource against Data Breaches in the Hacking Age You’re probably just as concerned about the rise of online fraud, data breaches, hacks and stollen accounts as the rest of the world is lately. There is a site to help you verify if you have been compromised: HaveIBeenPwned.com (HIBP). HIBP boasts a database of 581,434,781 stolen user accounts for you to check your email accounts against. The impressive amount of hacked data includes information sourced from 91 different […]

Read more

How Hackers Got Away with over $80 Million from Bangledesh Bank

Demonstrating the need for increased security against malware and malicious website, reports have emerged of a group of unknown hackers that broke into Bangladesh’s central bank. Once in, they obtained the credentials needed for payment transfers from Federal Reserve Bank of New York and then transferred large sums to fraudulent accounts based in the Philippines and Sri Lanka. Ultimately four requests to transfer a total of about $81 million to the Philippines had already gone […]

Read more

Pharma-Fraud Continues to Dominate Spam

Have you taken a look inside your Spam folder recently?  Without a doubt you’ll find the folder full of pharmacy Spam, pitching everything from Cialis and Viagra to Vicodin and Hydrocodone.  The problem is almost none of the linked web sites are legitimate certified pharmacies.

 

Read more