Unless you are living under a rock, you are probably very familiar or at least aware of the purported bias in the news. Depending on your political leanings, you may have strong opinions and ideas about the veracity of your news sources (and those you don’t favor).
As a web content categorization company, we are intensely focused on the trends in the types of content being published on the web, how this content is accessed, used and shared, who is publishing the content, and hundreds of other details that goes into our efforts to provide the market’s best web categorization services.
For the second straight year, zvelo’s IoT Security Platform ranked among the finalists in ECD’s Innovation Awards for next-generation IoT frameworks aimed at securing business and residential networks from nefarious Internet of Things devices.
A sensational headline. A heart-wrenching image. We can’t look away. We can’t resist clicking. And click, we look, we like—and voila—we have just helped shape today’s news cycle. Without even realizing, we have just been swept up in our own News Vacuum.
Savvy marketers, politicians, and publishers all capitalize on the public’s emotional response to these sorts of triggers. Their objectives vary. Inform readers/viewers? Possibly. Drive traffic and more clicks? Definitely.
First off, let’s make it clear that there is nothing inherently malicious about the act of cryptocurrency mining. Rather, over the past couple of years cybercriminals and bad actors have leveraged existing exploits and found unsecured hardware to implant Cryptocurrency Mining code and steal CPU/GPU cycles from computer owners and website visitors without their knowledge. These activities are what we refer to as “Malicious Cryptocurrency Mining”.
In a recent article published by IT Briefcase—zvelo Security Analyst, Louis Creager, outlined and describes one of the most prominent trends threatening router networks around the world. Ubiquitous as they are in our households, relatively few consumers are conscious of the firmware running on their home router
One of the largest security gaps in 2018—one that leaves devices open to malware, botnets, and use in DDoS attacks—is the lack of commitment from router and gateway manufacturers. But what is the incentive for OEMs to build the infrastructure and systems to maintain and update device firmware even after just a few years?
I was recently debugging a nasty issue in one of our backend services and needed to view the exact HTTP request & response being sent to an authentication server. Fortunately, Go’s standard library provides http.RoundTripper, httputil.DumpRequestOut & httputil.DumpResponse, which are great for dumping the exact out-bound request & the response. But since an authentication request contains credentials and a response contains a security token, it would have been insecure to record credentials & tokens in our logging systems. How could I securely exfiltrate the information I needed, while maintaining security and not requiring a whole lot of changes to my codebase or deployment environment?
By Eric Watkins, Senior Malicious Detection Researcher at zvelo This week, a new security vulnerability subject to remote attack, known as Devil’s Ivy, is targeting the C++ library used by thousands of different IoT device vendors. The most popular devices being compromised are IoT video cameras; however, the associated risk is not limited to video…