Personalized marketing or ‘one-to-one’ marketing was built on the assumption that people are willingly or unknowingly ready to ‘give in’ their personal data in exchange for a more personalized experience or for ‘free’ services. But now, after the introduction of GDPR, businesses will not be in control of consumers’ personal data anymore: clients themselves have to be in charge of that.
Continue reading “The value of personal data.”
Today’s mobile shoppers are more research obsessed than ever. They spend time searching mobile sites and apps to find the best products, deals, and reviews. This new consumer switches between apps and mobile sites before making a final decision. Throughout this ritual, he expects friction-free research experiences and seamless points of sale. This new behavior requires merging teams among app and mobile web marketers. However many organizations still silo these teams, resulting in fragmented user experiences.
Continue reading “Merging teams app and mobile site improves the customers purchasing journey.”
Who are you going to call?
When we’re shopping, we often turn to friends or acquaintances we trust for a fresh set of eyes. We want to double check our decisions. We want to steer clear of making the wrong choice. Mobile searches have changed that.
Continue reading “Mobile searches, consumers best friend marketers great opportunity.”
Cybersecurity gets a new pillar.
Great news, Bletchley Park is creating a cybersecurity college. Teaching 16-19-year-olds cybersecurity skills along with maths, physics, computer science and economics. What better place for the college to be located than at Bletchley Park. The UK’s hub of codebreaking during the second world war, where the infamous Enigma Code was deciphered.
Continue reading “Cybersecurity college to open at Bletchley Park”
Great news for cybersecurity
The UK government has announced an initiative that will see it join forces with some of the country’s hottest start-ups. They will fund the development of a start-up accelerator program that will help protect the UK from cyber attacks.
Continue reading “UK’s cybersecurity start-up accelerator program”
Apple has released iOS 9.3.5 update for iPhones and iPads to patch three zero-day security vulnerabilities. This happenned after finding a piece of spyware targeting the iPhone of a renowned UAE human rights defender, Ahmed Mansoor.
Continue reading “Apple’s Emergency patch for the zero-day security issues”
Responsibility for securing enterprise applications has been moving down the development lifecycle, and for good reason. It not only makes the enterprise obtain security, but also saves companies time and money. In this article, we can talk about code security and what its impact.
Continue reading “Protect your code – protect your data”
NETMYSOFT Chief Technical Officer (CTO) Laxman Muthiyah spotted a freebooting vulnerability on Facebook‘s Rights Manager platform. Freebooting means the act of downloading someone else’s pirated content and uploading it on another online platform.
Continue reading “‘Freebooting’ vulnerability in Facebook tool”
Specialists believe that cyber attackers used the toolkit, dubbed “HOMEKit” by Palo Alto Networks, to generate malicious Microsoft Word documents for various campaigns since 2013. Similar to the MNKit exploit generator, HOMEKit relies on the CVE-2012-0158 vulnerability in Office to deliver malware.
Continue reading ““HOMEKit” the Exploit Generator Used to Deliver Espionage Malware”
According to the hackernews, a new way to stole data form air-gapped computer was found. The technique got the name “DiskFiltration” and it is as interesting as it sounds. Air-gapped computers are compuers isolated from the Internet and other devices. Specialists considered for a long time thaty they are the most secure and safest place for storing data in critical infrastructures such as:
- industrial control systems
- financial institutions
- classified military networks.
Continue reading “Transfer Stolen Data from Air-Gapped Computer by using HDD’s noise”
Created by the mysterious hacker known as Satoshi Nakamoto, the blockchain technology — the distributed ledger technology that underlies the Bitcoin virtual currency — Blockchain has the potential to upend industries from finance to real estate to entertainment.
In the simplest terms, the blockchain transfers value from one party to another over the Internet. That could be money, a share of stock, a property deed, a digital royalty—even a vote cast in an election.
Continue reading “Blockchain technology- the new internet of value”
Israel will consolidate the strands of its cyber-security apparatus under one roof, according to the coutry’s parliament, the Knesset.
Continue reading “Israeli parliament recommended the creation of national central cyber-authority”
What is visual hacking? In essence, visual hacking is spying what’s on others’ computer screens and desks.
3M’s 2016 Global Visual Hacking Experiment has found that the overwhelming majority of companies across the globe are not prepared to detect visual hacking in business office environments or to protect their most valuable information. To test the efficacy of visual hacking techniques, 3M had a white hat assume the role of a temporary office worker.
Continue reading “Visual Hacking and its success”
Google added new alerts to Gmail this week in order to improve the security of its users. The Gmail alerts inform the users when Google can’t authenticate messages and when they contain dangerous URLs.
Gmail is now alerting users whenever they receive messages that can’t be authenticated with either Sender Policy Framework(SPF) or DKIM. The alert comes in the form of a question mark instead of the sender’s profile photo, corporate logo, or avatar.
Continue reading “Gmail flags dangerous emails”
According to the (www.securityweek.com), researchers from the University of California, Riverside and the U.S. Army Research Laboratory discovered that a Transmission Control Protocol (TCP) specification implemented in Linux (a flaw) creates a vulnerability that can be exploited to terminate connections and conduct data injection attacks by using a method that allows a blind, off-path attacker to intercept TCP-based connections between two hosts on the Internet.
Continue reading “Linux flaw allows hijacking web connections”
Android has Fallen! Experts discovered yet another set of Android security vulnerabilities in Qualcomm chipsets that affect more than 900 Million Android smartphones and tablets worldwide.
What’s even worse: Most of those affected Android devices will probably never be patched.
Dubbed “Quadrooter,” the set of four vulnerabilities discovered in devices running Android Marshmallow and earlier that ship with Qualcomm chip could allow an attacker to gain root-level access to any Qualcomm device.
Continue reading “Yet another hack for Android”
Quietly and without much public recognition, the National Guard has been developing a sophisticated capability for cyberdefense.
A few weeks ago I was on Capitol Hill at an event sponsored by the Lexington Institute discussing the growing role of the National Guard in protecting the nation’s critical infrastructure from cyberattacks — specifically the electric power grid. Risks to US critical infrastructures are growing significantly; the Department of Homeland Security reported a seven-fold increase in cyber incidents on critical infrastructures between 2010 and 2015.
Continue reading “Guarding The Grid”
The FederalTradeCommission(FTC) has called for the better development of connected devices for consumer privacy in the context of IoT.
Continue reading “#DefCon FTC Stresses IoT Concerns”