Call +1 (720) 897-8113

Archive for the Network Security Category

eWeek Interviews zvelo on its Debut of its IoT Security Platform to Profile Device Risk

eWeek Interviews zvelo on its Debut of its IoT Security Platform to Profile Device Risk

Content categorization vendor moves into the IoT space, adding new capabilities to discover and profile devices. *****The following article, by Sean Michael Kerner , appears in the Security section on eWeek’s web site and was originally published on June 14 , 2017. Content categorization vendor zvelo is getting into […]

Read more

Top 4 Takeaways for Guarding Against Ransomware Attacks After WannaCry

Top 4 Takeaways for Guarding Against Ransomware Attacks After WannaCry

By Eric Watkins, Senior Malicious Detection Researcher at zvelo Earlier this month WannaCry was named the world’s biggest cyberattack which hit at over 150 countries and infected over 300,000 machines across hospitals, universities, manufacturers, government agencies and other important centers. This nasty ransomware encrypted files on a […]

Read more

Best Practices You Can Adopt to Help Protect Against Router Vulnerabilities

Best Practices You Can Adopt to Help Protect Against Router Vulnerabilities

About two months ago, I posted a video blog showing how easy it is to obtain unauthenticated root access on a very popular Netgear router. This Netgear vulnerability received overwhelming news coverage and the urgent call went out across the Internet to patch all of their routers […]

Read more

“Why Aren’t IoT Manufacturers Doing More to Prevent Botnet Attacks?” IoT Evolution Magazine Feature News by Jeff Finn, special guest

“Why Aren’t IoT Manufacturers Doing More to Prevent Botnet Attacks?” IoT Evolution Magazine Feature News by Jeff Finn, special guest

*****The following article, by Jeff Finn, appears within the Featured News section of IoT Evolution Magazine’s web site and was originally published on February 23, 2017. Malicious hackers seeking out unsecured devices to add to their botnet armies is not new, but the Internet of Things (IoT) revolution […]

Read more

zvelo’s CEO, Jeff Finn, offers his opinion on the future of IoT security in InfoSecurity Magazine

zvelo’s CEO, Jeff Finn, offers his opinion on the future of IoT security in InfoSecurity Magazine

Users Can Secure Their IoT Devices; But Will They? *****The following article, by Jeff Finn, appears within the Opinion section of InfoSecurity Magazine’s web site and was originally published on February 15, 2017. On an increasingly massive scale, cybercriminals are repurposing connected Internet of Things (IoT) devices […]

Read more

IoT, Botnets and DDOS: Avoid Becoming Part of the Problem

IoT, Botnets and DDOS: Avoid Becoming Part of the Problem

IoT, Botnets and DDOS: Avoid Becoming Part of the Problem Recently, hackers successfully unleashed an absolutely massive Distributed Denial of Service (DDoS) attack that swiftly knocked some popular websites offline, including Twitter, Spotify, Amazon and even GitHub. DDoS attacks are of course nothing new, but the latest […]

Read more

zvelo Spent the Week with over 20,000 Hackers at DEF CON 24 (Final Thoughts)

zvelo Spent the Week with over 20,000 Hackers at DEF CON 24 (Final Thoughts)

zvelo Spent the Week with over 20,000 Hackers at DEF CON 24 — Wraping it all up (Pt. 4) DEF CON is one of the largest, (if not the largest), hacker conferences in the world. Held over four days every August in Las Vegas, DEF CON is […]

Read more

zvelo Spent the Week with over 20,000 Hackers at DEF CON 24 (Pt. 3)

zvelo Spent the Week with over 20,000 Hackers at DEF CON 24 (Pt. 3)

zvelo Spent the Week with over 20,000 Hackers at DEF CON 24 — Here’s What We Saw (Pt. 3) DEF CON is one of the largest, (if not the largest), hacker conferences in the world. Held over four days every August in Las Vegas, DEF CON is […]

Read more

zvelo Spent the Week with over 20,000 Hackers at DEF CON 24 (Pt. 2)

zvelo Spent the Week with over 20,000 Hackers at DEF CON 24 (Pt. 2)

zvelo Spent the Week with over 20,000 Hackers at DEF CON 24 — Here’s What We Saw DEF CON is one of the largest, (if not the largest), hacker conferences in the world. Held over four days every August in Las Vegas, DEF CON is now in […]

Read more

zvelo Spent the Week with over 20,000 Hackers at DEF CON 24

zvelo Spent the Week with over 20,000 Hackers at DEF CON 24

zvelo Spent the Week with over 20,000 Hackers at DEF CON 24 — Here’s What We Saw DEF CON is one of the largest, (if not the largest), hacker conferences in the world. Held over four days every August in Las Vegas, DEF CON is now in […]

Read more

zvelo Recognizes its Staff in the Fight Against Sexual Exploitation of Children

zvelo Recognizes its Staff in the Fight Against Sexual Exploitation of Children

zvelo Recognizes its Staff in the Fight Against Sexual Exploitation of Children   “WE KNOW THAT TECHNOLOGY FACILITATES THE SEXUAL EXPLOITATION OF CHILDREN, BUT WE ALSO KNOW THAT WITHIN TECHNOLOGY RESIDES A SOLUTION.” – ERNIE ALLEN, FORMER PRESIDENT & CEO THE INTERNATIONAL CENTRE FOR MISSING AND EXPLOITED […]

Read more

zvelo now provides Cloud and Local Integration Options for Ultra-fast and Secure Access to Content and Device Datasets with zveloAPI™

zvelo now provides Cloud and Local Integration Options for Ultra-fast and Secure Access to Content and Device Datasets with zveloAPI™

zvelo Unveils zveloAPI™  to Power High-speed Access to Datasets zvelo, the leading provider of website and device categorization, unveils zveloAPI™, an ultra-fast, secure API, for accessing the zveloDP datasets through cloud-based queries and streaming data feeds. zveloAPI was designed to support a broad range of integration and […]

Read more

An Invaluable Resource Against Data Breaches in the Hacking Age

An Invaluable Resource Against Data Breaches in the Hacking Age

An Invaluable Resource against Data Breaches in the Hacking Age You’re probably just as concerned about the rise of online fraud, data breaches, hacks and stollen accounts as the rest of the world is lately. There is a site to help you verify if you have been compromised: HaveIBeenPwned.com […]

Read more

zvelo Urges Partners (and everyone) to Update their SSL Certificates to SHA-2

zvelo Urges Partners (and everyone) to Update their SSL Certificates to SHA-2

zvelo Urges Partners (and everyone) to Update their SSL Certificates to SHA-2 After December 31, 2015, SSL certificates that use the SHA-1 hash algorithm for their signature will be declared “technology non grata” on the modern Internet. It’s important to note that this is an industry-wide change […]

Read more

Ad Fraud Q&A: Partner SpotX Talks Ad Fraud with zvelo

Ad Fraud Q&A: Partner SpotX Talks Ad Fraud with zvelo

Partner SpotX holds Q&A with zvelo Business Development Vice President, Cordell BaanHofman, on all things ad fraud related. SpotX recently sat down with Cordell BaanHofman, our VP Business Development here at zvelo to discuss the current state of fraud in the industry, including brand safety challenges and […]

Read more

How Hackers Got Away with over $80 Million from Bangledesh Bank

Demonstrating the need for increased security against malware and malicious website, reports have emerged of a group of unknown hackers that broke into Bangladesh’s central bank. Once in, they obtained the credentials needed for payment transfers from Federal Reserve Bank of New York and then transferred large […]

Read more

EU-US Privacy Shield: EU Commission and United States agree on new framework for transatlantic data flows

EU-US Privacy Shield: EU Commission and United States agree on new framework for transatlantic data flows

EU-US Privacy Shield EU Commission and United States agree on new framework for transatlantic data flows A new US/EU arrangement puts stronger regulations on companies in the U.S. to protect the personal data of Europeans and stronger monitoring and enforcement by the U.S. A few highlights that […]

Read more

Crowdsourced Security for Web Threat Intelligence

If we have a thousand monkeys typing away on a thousand typewriters, surely they can produce great works of literature – or so goes the popular adaptation of the Infinite Monkey Theorem. But in the context of information security, a similar idea has been taking shape in past few years. Crowdsourced security, leveraging on input from a host of geographically dispersed systems, is slowly gaining ground as a means to provide actionable threat intelligence for both the public and private sectors.

Read more

Thoughts on Secure Programming, Education and BYOD

Heartbleed vulnerability logoRecent events serve as the best example of how the context of security has shifted from the once server-centric model to that of a decentralized threat landscape. From the Heartbleed attacks to the widespread Internet Explorer vulnerabilities and finally the sensationalized OAuth issues, it appears that even organizations with a hardened perimeter infrastructure are just as vulnerable as an end-user at home. Although threats geared towards enterprise infrastructure are by no means going away, the prevalence of vulnerabilities affecting end-users are alarming to say the least.

Read more

Hack In The Box 2013 Kuala Lumpur Highlights – RFID, AIS and SDR

zveloLABS once again attended the 2013 Hack In The Box (HITB) conference in Kuala Lumpur, Malaysia, held in mid-October. Of all the wide variety of talks conducted during the conference, I found two correlated with the vulnerabilities of RFID systems to be the most intriguing. I’ve summarized them below.

Read more

ROOTCON 2013 Conference Highlights

DEFCON Philippines 2013 logoOnce again, zveloLABS participated in the 2013 ROOTCON annual hacker conference and security gathering in Cebu City, Philippines. It aims to share best practices and technologies through talks by qualified speakers and demos of exciting hacks, tools, tips, and more. The event was attended by groups and individuals who share similar interests in information security. Following is a summary of a few of the topics presented.

Read more

Black Hat USA 2013 Highlight

Black Hat USA 2013 logoI attended one of the Black Hat training sessions titled “Advanced C++ Source Code Analysis.” It was quite fascinating! Looking through source code for bugs seems to be a different mindset from writing software. While reading the buggy code I often found myself thinking, “Yes, that should work,” and then realized that what looked fine was actually horribly dangerous.

Read more

DEF CON 2013 Highlights

The annual DEF CON® hacker conference came and went as swiftly as a light rain against the hot Las Vegas strip. Consumer tech was a big focus and speakers demonstrated how various network-connected gadgets, once hacked, could be controlled to affect the real, physical world. Here are some highlights from two particular lectures about the hacking of network-connected and radio-frequency identification (RFID) enabled devices that got much attention.

Read more

US-China Talks on Cyber Security: An Exercise in Futility

With the growing number of alleged cyber-attacks that are taking place between the United States and the People’s Republic of China, the talks in early June of 2013 between President Barrack Obama and President Xi Jinping were viewed as a much needed response to the crisis. Unfortunately, such steps may end in either half-hearted agreements or may collapse entirely under their own weight. Depressing as this outlook may be, such pessimism is rooted in the fact that cyber space, as a medium on which to expand national policy, is too good to pass up on for either party. Central to this idea is the fact that both countries have invested heavily in cyber space not only as a means of communication, but for economic growth as well.

Read more

Playing with Fire: The State of Cyber Attacks and Cyber Warfare

Following reports of cyber-attacks targeting the New York Times in January of 2013, a secretive legal review of the powers available to the president of the United States has brought to light the option of launching preventive cyber-attacks should credible evidence indicating an impending threat against the United States surface. In this context the United States reserves the right to use cyber weaponry with or without an existing state of war. While rhetoric concerning the growth of cyber threats has grown more prominent in the last three years, this is the first instance that a state has been reported to view cyber-instruments as a “preventive” or “deterrent” option. Though heavy investments have been made in the past years, there is no empirical evidence that demonstrates that the United States intends to utilize its cyber-capabilities as announced.

Read more

ROOTCON 2012 Information Security Conference Recap: Part One

zvelo attended the 2012 ROOTCON Information Security Conference

zveloLABS® recently had the opportunity to attend ROOTCON 2012, an annual hacker conference and information security gathering, that was held in Cebu City, Philippines. The organizer line-up was interesting and quite varied. Attendees came from government, private and academic sectors. Following is part one of two recaps about this insightful event.

 

Read more

Protecting Business Networks From Drive By Spam Attacks

”Drive by” spam attacks are a growing business network security risk, affecting those who open emails containing a malicious script that downloads malware to the user’s PC that ultimately infects the company’s network. These emails don’t always include an attachment. Some HTML-based varieties are reported to be activated with the mere opening of an email and nothing more.

Read more

Hack in the Box Security Conference (HITBSecConf) 2011: A Look Back

zveloLABS™ reported live from the 2011 Hack in the Box Security Conference (HITBSecConf) in Malaysia. Following are additional reflections about the conference and other highlights worth mentioning.

 

Read more

DEF CON – Las Vegas 2011: Plenty of Hype and Substance

DEF CON 2011 in Las Vegas - logo

Day One
My first year at the world’s largest hacker convention, DEF CON, resulted in mixed first impressions. I was amazed and overwhelmed with how large the crowds were. This event seemingly grows in popularity each year and the overly-stuffed conference rooms were proof. With that single point aside, I was able to sit-through some valuable lectures across a wide range of security topics.

 

Read more

Black Hat – Las Vegas 2011: Report #4 – DARPA’s “Cyber Fast Track” Program Excites the Private Security Sector

Day one at Black Hat was a hit; so naturally, I looked forward to day two. I sat through a keynote given by Peiter Zatko, better known as “Mudge,” who is a Program Manager at DARPA. Mudge announced a new DARPA initiative called “Cyber Fast Track.”

 

Read more

Black Hat – Las Vegas 2011: Report #3

After getting my badge, I walked through the show floor where breakfast was plentiful and corporate sponsor booths were in full force. It seemed as if everyone had a contest to win a free iPad, which I’ve yet to win.

 

Cofer Black
I made my way to the keynote to catch Cofer Black, who spoke softly and was therefore very difficult to understand. The random fire alarm in the middle of his talk didn’t help. Cofer has clearly been central to the U.S. cyber-warfare and cyber-counter-terrorism efforts as well as a great deal of intelligence gathering. He clearly believes that the U.S. is very well prepared, and better prepared than any other nation, to engage in cyber-warfare. Additionally, he is certain that in the next major conflict, the Internet will be a virtual battleground and as significant as the real world. So, overall, while the talk was disjointed, he was quite impressive.

 

Read more

Latest News

Corporate Headquarters

zvelo, Inc.
8350 East Crescent Parkway, Suite 450
Greenwood Village, CO 80111
Phone: +1 (720) 897-8113
Toll Free: +1 (877) 77-zvelo (US Only)
Fax: +1 (720) 897-6544

Contact Us:

Affiliations