Call +1 (720) 897-8113

zvelo Blog

Welcome to the zvelo Blog

The zvelo blog is where folks from zvelo discuss issues facing our markets – ad tech, network security and mobile service provider analytics.  We discuss web security, malicious traffic, ad fraud, data breaches, artificial intelligence, fake traffic, website categorization, phishing, bots, privacy, BlackHat, DEF CON, Hack-in-the-Box, contextual targeting, semantic targeting, privacy, online safety and more.

AdTech Has Another Problem: Low-quality Traffic.

AdTech Has Another Problem: Low-quality Traffic.

AdTech Has Another Problem: Low-quality Traffic. It seems as if every other day you encounter a post warning advertisers and platforms alike about the occurrence of fraudulent traffic and the threat to ad budgets that it poses; a recent study released in January states that fraud alone […]

Read more

Google Open-sources its Artificial Intelligence Software, SyntaxNet

Google Open-sources its Artificial Intelligence Software, SyntaxNet

Google Open-sources its Artificial Intelligence Software, SyntaxNet Google open-sourced its artificial intelligence software, SyntaxNet, aiming to get more human brains attacking the challenge of natural language understanding by computers. Ultimately the company hopes to accelerate the progress of natural language research and development by provided free access to their […]

Read more

Clear Message Being Delivered to AdTech… Adapt or Die.

Clear Message Being Delivered to AdTech… Adapt or Die.

Clear Message Being Delivered to AdTech… Adapt or Die. Some would say the AdTech industry appears to be intent on gradually destroying itself. The acceleration of consumer ad blocking and uncertainty around viewability and fraud are symptomatic of serious issues challenging the ad ecosystem. Is there a […]

Read more

zvelo Team Taps into Water for All

zvelo Team Taps into Water for All

The zvelo Team Taps into Water for All As some of you know, zvelo recently moved to our new office location in Greenwood Village, Colorado and upon arrival the staff got an extra treat, a reusable water bottle from Give Me Tap. Mind you, this isn’t just a […]

Read more

zvelo Urges Partners (and everyone) to Update their SSL Certificates to SHA-2

zvelo Urges Partners (and everyone) to Update their SSL Certificates to SHA-2

zvelo Urges Partners (and everyone) to Update their SSL Certificates to SHA-2 After December 31, 2015, SSL certificates that use the SHA-1 hash algorithm for their signature will be declared “technology non grata” on the modern Internet. It’s important to note that this is an industry-wide change […]

Read more

Companies creating in-house ad tech trading desks find the need for more partnership clarity.

Companies creating in-house ad tech trading desks find the need for more partnership clarity.

Companies That are Creating In-house Ad Tech Trading Desks Find the Need for More Partnership Clarity A recent article in AdAge points out that as more marketers embrace highly sophisticated digital media buying technology, many are discovering the need to build their own partnerships and systems to […]

Read more

Internet Safety Resources, Guides and Tips for Everyone

Internet Safety Resources, Guides and Tips for Everyone

This article will be updated periodically, in support of numerous global online safety awareness campaigns occuring every year – Safer Internet Day (promoted in February), Cyber Security Awareness Month (October), IWF Awareness Day (also in October) and others. During these times, web safety advocates, companies, organizations and professionals worldwide raise awareness about safer and more responsible use of online technologies and mobile devices. Following is a living repository of online resources, guides, tips and entities aimed at helping everyone enjoy worry-free Internet experiences. Additional web safety resources will be hand-picked and added as they are discovered. To possibly be included in this list, or if other online safety resources exist that deserve mention, please feel free to comment below. Including a link and a brief description with each comment helps.

Read more

Ad Fraud Q&A: Partner SpotX Talks Ad Fraud with zvelo

Ad Fraud Q&A: Partner SpotX Talks Ad Fraud with zvelo

Partner SpotX holds Q&A with zvelo Business Development Vice President, Cordell BaanHofman, on all things ad fraud related. SpotX recently sat down with Cordell BaanHofman, our VP Business Development here at zvelo to discuss the current state of fraud in the industry, including brand safety challenges and […]

Read more

How Hackers Got Away with over $80 Million from Bangledesh Bank

Demonstrating the need for increased security against malware and malicious website, reports have emerged of a group of unknown hackers that broke into Bangladesh’s central bank. Once in, they obtained the credentials needed for payment transfers from Federal Reserve Bank of New York and then transferred large […]

Read more

EU-US Privacy Shield: EU Commission and United States agree on new framework for transatlantic data flows

EU-US Privacy Shield: EU Commission and United States agree on new framework for transatlantic data flows

EU-US Privacy Shield EU Commission and United States agree on new framework for transatlantic data flows A new US/EU arrangement puts stronger regulations on companies in the U.S. to protect the personal data of Europeans and stronger monitoring and enforcement by the U.S. A few highlights that […]

Read more

Ad Blocking: Consumer Response to Dismal User Experience

Ad Blocking: Consumer Response to Dismal User Experience

Ad Blocking: Consumer Response to Dismal User Experience Ad Blocking is garnering much attention these days and statistics show there is a dramatic increase in the number of consumers who are taking advantage of ad blocking technologies. In fact, a recent IAB study noted a 48% YOY […]

Read more

And Now There’s MaaS: “Malware as a Service!”

And Now There’s MaaS: “Malware as a Service!”

 And Now There’s MaaS: “Malware as a Service!” The cyber arms race just got crazier. You’ve heard of SaaS…DaaS… now there’s MaaS – “Malware as a Service.” This means cybercrooks are figuring out tricks to make the life of anti-virus heros much harder. The UK’s National Crime […]

Read more

IAB Report shows $8.2B a year being lost to online fraud and malware in the digital advertising industry.

IAB Report shows $8.2B a year being lost to online fraud and malware in the digital advertising industry.

IAB Report shows $8.2B a year being lost to online fraud and malware in the digital advertising industry. A new report* released  by the Interactive Advertising Bureau called, “What Is An Untrustworthy Supply Chain Costing the Digital Advertising Industry,” shows that $8.2 billion being lost to online fraud […]

Read more

An experiment in buying Internet traffic – video

An Experiment in Buying Internet Traffic zvelo Chief Security Scientist, Mark Ryan Talabis, wanted to see if he could buy Internet traffic and if so, would the traffic actually be human generated or would it be driven by bots or of low quality. He performed an experiment […]

Read more

‘Ware the Web-the Lesson from the Yahoo Malvertising Attack

‘Ware the Web-the Lesson from the Yahoo Malvertising Attack The ad tech industry has been reeling for the past 12 months over ad fraud and the industry is starting to come to terms with it. But unfortunately, ad fraud is just the tip (albeit, a very costly […]

Read more

Pre-emptive ad fraud detection = protection

Pre-emptive ad fraud detection = protection On June 26th, Kathy Leake, CEO of Qualia, wrote a very thoughtful column entitled “We Need Clearer Fraud Definitions, More Standard Measurement.” In it, she called for fraud definitions to be agreed upon between buyers and sellers and for pre-emptive fraud […]

Read more

The Magnitude of the Breach

The Magnitude of the Breach On Thursday, June 4, it was announced that there was a large breach of the Office of Personnel Management (OPM) of the federal government. The Chinese are fingered in the breach, in which about 4 million people’s records were lost in the […]

Read more

Ad Age looks inside Google’s war on ad fraud

Ad Age looks inside Google’s war on ad fraud Ad Age had an opportunity to look inside the hood of Google’s war on ad fraud and the article is an eye opener for those who really have never looked into the dark places on the web. Although […]

Read more

An Experiment: Adventures in Buying Internet Traffic

An Experiment:  Adventures in Buying Internet Traffic On April 22nd, 2015, zvelo Chief Security Scientist, Mark Ryan Talabis presented a five minute video on buying low cost Internet traffic to replicate ad fraud.  First he set up a honeypot site; then he shopped some blackhat traffic vendors […]

Read more

Too Damn Rich – Ad Fraud

Too Damn Rich – Ad Fraud I recently read an article that predicts global ad tech revenue will rise from a forecasted humble $30 billion for 2015, to $100 billion in 2020. If ad tech were a country, it would have a larger economy than 120 countries. […]

Read more

Mobile Advertising

As a media buyer previously, I was always frustrated with the lack of tracking on iOS in mobile inventory. However, it was possible to track performance on Android and as Android’s market share grew, so did the conversions attributed to mobile display. Mobile apps, however, were another […]

Read more

Explaining zvelo Contextual Categorization

The URL checker found on the zvelo.com homepage, previously known as the “Test-a-site” tool, serves to demo various contextual categorizations about URLs that can be derived by licensing zvelo contextual categorization and malicious website detection services. When queried, the URL checker yields a sample of data sets […]

Read more

How Ad Networks are Being Used for Scamvertising

How Ad Networks are Being Used for Scamvertising The Internet age has shown us a myriad of online scams, from get rich quick schemes to winning the lottery, typically originating via an email hook. This is a blind way of distributing scams, since scammers have no way […]

Read more

Crowdsourced Security for Web Threat Intelligence

If we have a thousand monkeys typing away on a thousand typewriters, surely they can produce great works of literature – or so goes the popular adaptation of the Infinite Monkey Theorem. But in the context of information security, a similar idea has been taking shape in past few years. Crowdsourced security, leveraging on input from a host of geographically dispersed systems, is slowly gaining ground as a means to provide actionable threat intelligence for both the public and private sectors.

Read more

Contextual Categorization & Brand Safety – French Child Abuse Trial

Advertisements are everywhere, from print publications to road-side billboards, and of course TV and on the Web. The intent of advertising is no different regardless of the medium. Advertisers are constantly feuding to win over consumer sentiment. On the Internet, ad-serving technologies have become so advanced that ads can now be targeted based on one’s individual web browsing history and behaviors, likes, shares, location, device type and other factors. From time to time, however, ad placements land severely out-of-context, and here is one such example of online advertising gone bad.

Read more

zvelo Joins IAB to aid in fight against ad fraud

Ad fraud continues to plague the online advertising industry and advertiser trust in automated ad-serving technologies continues to dwindle. It’s not just traditional display advertising that’s susceptible. Digital video and mobile advertising are seeing their fair share of bot (non-human) generated impressions and clicks as well. zvelo has recently become an Associate Member of the Interactive Advertising Bureau (IAB) to help mold industry best practices to combat ad fraud.

Read more

Open Source Intelligence: The Web’s Dirty Little Secret

Our willingness to surrender personal privacy in exchange for services that we now consider essential, as discussed in a previous article, has made it much easier for large governments and private individuals alike to collect information.

Read more

Giving Up Our Privacy and Liking It

We are constantly reminded of the growing number of privacy concerns from the use of Information and Communications Technology (ICT). Some are quick to blame governments or commercial entities when our personal information is compromised. Very few stop to think whether or not the blame should be pointed at ourselves. To what extent are we as end-users responsible for facilitating our own personal privacy?

Read more

To WWW or Not to WWW? – zvelo categorization

If one performs the search “use www or not,” well over a billion results in many of the most popular search engines are returned. The focus of each result may differ. For zvelo, the usage is irrelevant because its contextual categorization processes are designed to identify and handle each component of a URL. At a simplistic view, the basic components of a URL are the following:

Read more

Data Protection – What to ask after a data breach

Cybercrime against high-profile entities like eBay and Target is on the rise, and the media has conjured up nightmarish scenarios of cyber-criminals going on shopping sprees with our well-earned cash – easily obtained through stolen credit card information. The risks that the general public faces vary and should not be applied equally.

Read more

More Relevancy for Ad Targeting with Greater Granularity

zvelo once offered 53 categories that were used to classify content on websites about Businesses & Services, Politics & Law, Portal Sites and others. This was later raised to 141 categories to help cover even more topics. The latest version boasts nearly 500 categories, making it one of the most granular categorization sets in the industry. We’ve managed to upgrade our categorization systems to better serve the needs of our existing and future technology partners and following is one example why this matters.

Read more

Top websites are targets for malvertising

The importance of the Alexa top websites can never be discounted in zvelo’s day-to-day operations. Providing contextual data sets about the Alexa top sites is a vital element for the online advertising market because it can assist in determining the most ideal and brand-safe placement of online ads and other promotional materials.

Read more

Thoughts on Secure Programming, Education and BYOD

Heartbleed vulnerability logoRecent events serve as the best example of how the context of security has shifted from the once server-centric model to that of a decentralized threat landscape. From the Heartbleed attacks to the widespread Internet Explorer vulnerabilities and finally the sensationalized OAuth issues, it appears that even organizations with a hardened perimeter infrastructure are just as vulnerable as an end-user at home. Although threats geared towards enterprise infrastructure are by no means going away, the prevalence of vulnerabilities affecting end-users are alarming to say the least.

Read more

Full Path URL Content Classification

Given the dynamic nature of the majority of today’s websites, categorization at the full path URL versus the base domain is superior and now required. Parts of a website include the top-level domain (.com, .org, etc.), the base domain (example.com), sub-domain (subdomain.example.com) or sub-path (example.com/page). When categorizing content, it is highly important to recognize exactly what is being classified within a website because content can differ dramatically across full path URLs.

Read more

Big Year of Change for the IWF

The Internet Watch Foundation works to remove online videos and images of child sexual abuse and its 2013 Annual & Charity Report highlighted significant milestones achieved and a big year of change.

Read more

Website categorization and URL Parameters

What is a URL parameter? Quite simply it is a string of characters, or a query string, that is appended to a URL that contains data. This data is passed to predefined web applications to find the appropriate content and return it back to the user’s web browser which then generates the entire web page. The query string can also be used for various other methods such as identifying a user’s session or using it as a way to look up information about your online bank account after you have logged in. URLs with parameters are used by various types of web sites however online shopping, auction, and banking type sites are probably the most prevalent.

Read more

Using Keyword Density for Website Categorization

Manually classifying the content on a single web page takes but a few seconds to accomplish. Analyzing the keywords – words or phrases – used and the number of instances of each – keyword density – is one way to go about it. When needing to classify the content on billions of web pages at a time, however, the task becomes overwhelmingly daunting for any human eye to handle. In this scenario, only an automated content classification engine can succeed.

Read more

Phishing Websites Detected by zvelo

Prior to this blog post, zveloLABS published a phishing URL alert about fake Apple account verification websites. Now, zvelo’s team of engineers and researchers has unearthed a new phishing attack campaign using fraudulent Facebook log-in sites.

Read more

WaterHole Attacks – Compromised Websites

Instances of large-scale compromises of both private industry and public institutions in 2013 prompted a flurry of activity among security researchers to identify emerging and established threats. Commonly identified as Advance Persistent Threats (APTs), this phenomenon is expected to continue well into the foreseeable future. Fundamental to the spread of these threats is one of their foremost methods of propagation – a water hole attack.

Read more

Detecting & Categorizing Websites that Promote Self-Harm

zvelo has received many requests from its technology partners who are in the web filtering and parental control sectors to institute and support a new category that can be used to identify websites that promote self-harm behaviors. As a result of such demand, a new “Self Harm” category has been added to the zveloDB® URL database.

Read more
Page 1 of 512345

Latest News

Corporate Headquarters

zvelo, Inc.
8350 East Crescent Parkway, Suite 450
Greenwood Village, CO 80111
Phone: +1 (720) 897-8113
Toll Free: +1 (877) 77-zvelo (US Only)
Fax: +1 (720) 897-6544

Contact Us:

Affiliations