Malicious Cryptocurrency Mining, Cryptomining, Cryptojacking, Malmining

What is Malicious Cryptocurrency Mining?

First off, let’s make it clear that there is nothing inherently malicious about the act of cryptocurrency mining. Rather, over the past couple of years cybercriminals and bad actors have leveraged existing exploits and found unsecured hardware to implant Cryptocurrency Mining code and steal CPU/GPU cycles from computer owners and website visitors without their knowledge. These activities are what we refer to as “Malicious Cryptocurrency Mining”.

Details
Advantages of DNS RPZ | How It Works

Advantages of RPZ: Basics & Common Configurations

Since the release of BIND 9 in 2010, RPZ has proven a powerful technology for security and network management—allowing organizations to implement an additional DNS configuration layer. In fact, BIND is the most widely used Domain Name System software on the internet—making RPZ configuration options like integrating commercial feeds, blocklists, and URL databases like zveloDB™ all the more attractive. So let’s take a moment to revisit the advantages of RPZ.

Details
Content as the New Clickbait: The Battle against News & Politics

Politics and News: The Growing Trend of Content as the New Clickbait

Over the past decade, the use of “clickbait” ads has become the norm in order to entice viewers to click on the ad and drive traffic to a publisher. Web surfers have grown accustomed to seeing the same types of clickbait ads and sponsored stories like the ones shown below with sensational headlines about curing cancer, stopping aging, improving your sex life and more.

Details
Dynamic Device Security & Detecting Anomalous Behavior

Dynamic Device Profiling & Anomaly Detection with IoTAgenda

Particularly with the proliferation of IoT devices—network security has grown increasingly porous—leaving gaping holes. zvelo is working with router and gateway manufacturers to provide an IoT Security Platform that dynamically and actively profiles and monitors ALL network-connected devices—giving you complete network visibility to improve security for customer networks.

Details
zveloCTI-cyber-threat-intelligence

Router Vulnerabilities, Firmware Updates, and Trends in 2018

In a recent article published by IT Briefcase—zvelo Security Analyst, Louis Creager, outlined and describes one of the most prominent trends threatening router networks around the world. Ubiquitous as they are in our households, relatively few consumers are conscious of the firmware running on their home router

Details
IoT Security & Networks Need Router Manufacturers Commitment

IoT Security Needs Commitment from Router Manufacturer’s to Maintain Device Firmware

One of the largest security gaps in 2018—one that leaves devices open to malware, botnets, and use in DDoS attacks—is the lack of commitment from router and gateway manufacturers. But what is the incentive for OEMs to build the infrastructure and systems to maintain and update device firmware even after just a few years?

Details