The value of personal data.

Categories financial internet, fsociety, international reports, Personal Data

Personalized marketing or ‘one-to-one’ marketing was built on the assumption that people are willingly or unknowingly ready to ‘give in’ their personal data in exchange for a more personalized experience or for ‘free’ services. But now, after the introduction of GDPR, businesses will not be in control of consumers’ personal data anymore: clients themselves have to be in charge of that.


personal data value

Continue reading “The value of personal data.”

Merging teams app and mobile site improves the customers purchasing journey.

Categories apps, international reports, mobile

Today’s mobile shoppers are more research obsessed than ever. They spend time searching mobile sites and apps to find the best products, deals, and reviews. This new consumer switches between apps and mobile sites before making a final decision. Throughout this ritual, he expects friction-free research experiences and seamless points of sale. This new behavior requires merging teams among app and mobile web marketers. However many organizations still silo these teams, resulting in fragmented user experiences.

merging app & mobile site Continue reading “Merging teams app and mobile site improves the customers purchasing journey.”

Mobile searches, consumers best friend marketers great opportunity.

Categories digital marketing, Google, international reports, mobile

Who are you going to call?

When we’re shopping, we often turn to friends or acquaintances we trust for a fresh set of eyes. We want to double check our decisions. We want to steer clear of making the wrong choice. Mobile searches have changed that.

mobile advise

Continue reading “Mobile searches, consumers best friend marketers great opportunity.”

Cybersecurity college to open at Bletchley Park

Categories cyberdefence, Education, international reports

Cybersecurity gets a new pillar.

Great news, Bletchley Park is creating a cybersecurity college. Teaching 16-19-year-olds cybersecurity skills along with maths, physics, computer science and economics. What better place for the college to be located than at Bletchley Park. The UK’s hub of codebreaking during the second world war, where the infamous Enigma Code was deciphered.

Bletchley Park opens cybersecurity college

Continue reading “Cybersecurity college to open at Bletchley Park”

UK’s cybersecurity start-up accelerator program

Categories cyberdefence, hacking, international reports

Great news for cybersecurity

The UK government has announced an initiative that will see it join forces with some of the country’s hottest start-ups. They will fund the development of a start-up accelerator program that will help protect the UK from cyber attacks.

start-up accelerator program CESG Continue reading “UK’s cybersecurity start-up accelerator program”

“HOMEKit” the Exploit Generator Used to Deliver Espionage Malware

Categories cyberdefence, international reports, malware

Specialists believe that cyber attackers used the toolkit, dubbed “HOMEKit” by Palo Alto Networks, to generate malicious Microsoft Word documents for various campaigns since 2013. Similar to the MNKit exploit generator, HOMEKit relies on the CVE-2012-0158 vulnerability in Office to deliver malware.


Continue reading ““HOMEKit” the Exploit Generator Used to Deliver Espionage Malware”

Transfer Stolen Data from Air-Gapped Computer by using HDD’s noise

Categories cyberdefence, hacking, international reports

According to the hackernews, a new way to stole data form air-gapped computer was found. The technique got the name “DiskFiltration” and it is as interesting as it sounds. Air-gapped computers are compuers isolated from the Internet and other devices. Specialists considered for a long time thaty they are the most secure and safest place for storing data in critical infrastructures such as:

  • industrial control systems
  • financial institutions
  • classified military networks.


Continue reading “Transfer Stolen Data from Air-Gapped Computer by using HDD’s noise”

Blockchain technology- the new internet of value

Categories financial internet, international reports

Created by the mysterious hacker known as Satoshi Nakamoto, the blockchain technology — the distributed ledger technology that underlies the Bitcoin virtual currency — Blockchain has the potential to upend industries from finance to real estate to entertainment.

In the simplest terms, the blockchain transfers value from one party to another over the Internet. That could be money, a share of stock, a property deed, a digital royalty—even a vote cast in an election.

blockchain technology

Continue reading “Blockchain technology- the new internet of value”

Visual Hacking and its success

Categories hacking, international reports

What is visual hacking? In essence, visual hacking is spying what’s on others’ computer screens and desks.

visual hacking

3M’s 2016 Global Visual Hacking Experiment has found that the overwhelming majority of companies across the globe are not prepared to detect visual hacking in business office environments or to protect their most valuable information. To test the efficacy of visual hacking techniques, 3M had a white hat assume the role of a temporary office worker.

Continue reading “Visual Hacking and its success”

Gmail flags dangerous emails

Categories Google, international reports

Google added new alerts to Gmail this week in order to improve the security of its users. The Gmail alerts  inform the users when Google can’t authenticate messages and when they contain dangerous URLs.

gmail alerts

Gmail is now alerting users whenever they receive messages that can’t be authenticated with either Sender Policy Framework(SPF) or DKIM. The alert comes in the form of a question mark instead of the sender’s profile photo, corporate logo, or avatar.

Continue reading “Gmail flags dangerous emails”

Linux flaw allows hijacking web connections

Categories international reports, Linux, Protocols

Linux flaw?

According to the (, researchers from the University of California, Riverside and the U.S. Army Research Laboratory discovered that a Transmission Control Protocol (TCP) specification implemented in Linux (a flaw) creates a vulnerability that can be exploited to terminate connections and conduct data injection attacks by using a method that allows a blind, off-path attacker to intercept TCP-based connections between two hosts on the Internet.

Continue reading “Linux flaw allows hijacking web connections”

Yet another hack for Android

Categories international reports, smart devices

Android has Fallen! Experts discovered yet another set of Android security vulnerabilities  in Qualcomm chipsets that affect more than 900 Million Android smartphones and tablets worldwide.

What’s even worse: Most of those affected Android devices will probably never be patched.
Dubbed “Quadrooter,” the set of four vulnerabilities discovered in devices running Android Marshmallow and earlier that ship with Qualcomm chip could allow an attacker to gain root-level access to any Qualcomm device.

Android security

Continue reading “Yet another hack for Android”

Guarding The Grid

Categories cyberdefence, international reports

Quietly and without much public recognition, the National Guard has been developing a sophisticated capability for cyberdefense.

A few weeks ago I was on Capitol Hill at an event sponsored by the Lexington Institute discussing the growing role of the National Guard in protecting the nation’s critical infrastructure from cyberattacks — specifically the electric power grid. Risks to US critical infrastructures are growing significantly; the Department of Homeland Security reported a seven-fold increase in cyber incidents on critical infrastructures between 2010 and 2015.


Continue reading “Guarding The Grid”