Estimated Reading Time: 3 minutes The resurgence of the Emotet trojan reminds us of these 5 habits everyone should develop to maximize your organization’s online security.
Estimated Reading Time: 10 minutes Malicious Cryptocurrency Mining, or Cryptojacking, is the unauthorized use of a user’s device to mine cryptocurrencies. This article covers primary infection methods and tips for identification and prevention of cryptomining malware.
Estimated Reading Time: 17 minutes We’ve put together this glossary of cyber threat definitions as a resource for you in your quest to help make the internet a safer place for all!
Estimated Reading Time: < 1 minute Once you see this vulnerability in action, it’s easy to imagine how easily devices can be exploited. Simple vulnerability hacks and tactics such as this can be used in coordination with home routers, smart speakers, video surveillance equipment, and much more to create havoc.
Estimated Reading Time: 5 minutes The size and magnitude of the Malware and Ad-fraud bot problem is immense and growing. And, as bots continue to proliferate, there’s important distinctions to point out between Malware bots and Ad-fraud bots.
Estimated Reading Time: < 1 minute The cyber arms race just got crazier. You’ve heard of SaaS…DaaS… now there’s MaaS – “Malware as a Service,” empowering and enabling cyber criminals.
Estimated Reading Time: < 1 minute A recent IAB Report shows $8.2B a year was lost to online fraud and malware in the digital advertising industry alone. This illustrates the importance…
Estimated Reading Time: 3 minutes
I got my hands on a copy of a Northwestern University research paper titled “Evaluating Android Anti-malware against Transformation Attacks.” After digging into it, my zveloLABS colleagues and I decided to conduct an experiment of our own based on the information provided in the research paper.
Estimated Reading Time: 2 minutes A new twitter spam campaign is making rounds, infecting users with rogue anti-virus malware. The spam mail attempts to convince the user that someone was trying to steal their Twitter account information, and to download a “secure module” to protect their account.
Estimated Reading Time: 2 minutes zveloLABS™ has uncovered thousands of compromised web servers hosting fake YouTube pages. Attempting to play the video on these fake pages prompts the user to install a ‘media codec’ which then infects the machine with malware.