Tag Archives: Google

Security Never Sleeps- Microsoft Bugs, Android Patches

New Microsoft Kernel Bug Could Permit Malicious Modules

“Could bypass antivirus systems”

Security researchers have found a Microsoft kernel bug that may allow attackers to bypass antivirus systems and load in its own malware that infects users devices. The kernel flaw has been discovered in the PsSetLoadImageNotifyRoutine in all operating systems ranging from Windows 2000 to the most recent version of Windows 10.

AXA Insurance data breach hits 5,400 customers in Singapore

“Sensitive information likely obtained”

AXA Insurance has now revealed it has suffered a cybersecurity incident that compromised personal data of about 5,400 customers in Singapore. The breach affected users of the firms health portal including past customers according to data protection officer Eric Lelyon in a Thursday e-mail to customers. No other alerts or notices were posted on its website. The breach , according to Leylon, “exposed” the customer’s e-mail address, date of birth, and mobile number, which was used to transmit one-time passwords when users transacted on the portal.

Experts Find 2007 Variant of Malware Linked to French Intelligence

“Babar origins may have been found”

Palo Alto Networks researchers have discovered a 2007 variant of Babar, a malware program believed to have been developed by a covert French intelligence agency. The activities of the cyber espionage group known as the Animal Farm came to light in March 2014, when a French publication released a series of slides from united States NSA whistleblower Edward Snowden. The slides belonged to Canada’s Communications Security Establishment and they detailed an espionage campaign dubbed “Operation Snowglobe.”

Google Patches 81 Android Vulnerabilities With September 2017 Updates

“13 rated critical”

81 security vulnerabilities have been addressed in the September set of security patches for the Android platform. 13 had a severity rating of critical. The security bulletin has two security patch levels, each focused on addressing vulnerabilities in specific components.

Enjoy your read? Check out our other content here.

Big Data Horizons- Unravel Success, Disney and Consumers

AppDynamics co-founder thinks Unravel may repeat his success

“Unravel may get there even faster”

The chairman of the app management tech company Cisco bought for $3.7 billion earlier this year thinks a Menlo Park startup can have the same kind of success helping customers manage their Big Data projects. He comments:

“I’ve been in the business of monitoring and managing apps for a long time and grew one of the largest companies in that space with AppDynamics,” Bansal said in an interview. “Big Data has been around for a long time and I see the same kind of pain and complexity of managing these systems that we saw with apps.”

Unravel CEO Kunal Agarwal said his 28-employee company is brought in on Day 2 after a company installs a Big Data system in the cloud or on premises. “We make to sure those Big Data projects run on time, are fast and error free and that the company can keep scaling in an intelligent fashion,” he said.

While AppDynamics Chairman Bansal sees similarities between the progress his nine-year-old company made en route to its $3.7 billion sale, he thinks Unravel Data (a 10Fold client) may get there even faster.

“Unravel is doing better than we did at their stage in selling to very large enterprises,” he said. “It’s not easy for a small startup to win that kind of business. Large enterprises will only do that if they see tremendous value in the product and the pain is very high.”

430M Internet of Things Devices Means a Healthcare Big Data Tsunami

“The Internet of Things keeps growing, leaving healthcare providers staring down a flood of big data and an imperative to alter their workflows.”

A new report from Tractica predicts that by 2022 manufacturers will be shipping out 430 million Internet of Things devices each year, leaving healthcare providers little time to prepare for a massive influx of potentially valuable big data.

As wearable fitness trackers are joined by a new generation of smart clothing and body sensors that may be able to collect an unprecedented amount of personal health data, providers and health IT developers will need to quickly work through the interoperability, data governance, patient engagement, and EHR optimization problems that have thus far been holding back the Internet of Things.

Ensuring that both providers and patients can leverage the full potential of the Internet of Things will be an ongoing mission for healthcare organizations, their developer partners, and their patients.  As the number of devices grows and the sophistication of these tools increases, the industry will need to carefully work through its big data access and management issues before it can improve the delivery of chronic disease care and population health management.

Disney Uses Big Data, IoT And Machine Learning To Boost Customer Experience

“RFID wristband tech captures even more data”

In 2013, after years of development and testing, Disney World launched its MyMagicPlus program. Now, every guest to Disney World gets a MagicBand, a wristband that is equipped with RFID technology and a long-range radio. These bands communicate with thousands of sensors and stream real-time data to hundreds of systems that make the entertainment venue a giant computer. All this data is designed to help Disney cast members anticipate all your desires so they can give you an incredible experience. The bands act as hotel keys, credit cards, tickets, FastPasses and more. With a simple swipe of the band across sensors located throughout the park, the giant system knows where you are, what you’re doing and what you need.

The goal of the tech team who developed the MagicBands was to “root out all the friction within the Disney World experience.” Even before you leave town you can set reservations for certain attractions (where you won’t have to wait in line—hallelujah!) And added bonus for Disney: Your choices get added to its data vault. Once you arrive on site, one of the biggest challenges of any amusement park is how to minimize the wait times for rides and attractions.

How tech giants are putting big data to work

“$15 trillion in value expected in 15 years”

The greatest aspect of big data is perhaps it’s ubiquity throughout the market and availability to everyone, from Walmart to the local mom and pop store.

Big data’s massive impact on the economy is largely driven by the fact that it’s universally available to large corporations and consumers alike. Nonetheless, tech giants like Google and Amazon are often the innovative birthplaces of the latest big data innovations.

Companies like Google, which catalog data for literally millions of searches each day, can analyze the information over the long term to detect useful trends and learn about their users. Google’s algorithms make great use of big data, for instance, when trying to determine what you’re searching for after you’ve only inputted a few characters into your search bar.

Other companies, like Amazon, are more ambitious with how they use big data to get to know their customers. Amazon’s marketplace is teeming with suggested products for their consumers, largely because the firm has harnessed big data to determine which products people in a certain demographic are likely to purchase, and markets those products specifically to them.

Enjoy your read? Check out our other content here.

Security Never Sleeps- Google Apps, Fancy Bear

Google Kicks 500 Apps Off Online Store Over Spyware Concerns

“Developers likely unaware of flaws”

The decision to remove over 500 apps from the Google Play online app store comes after researchers raised spyware concerns. Cyber security firm Lookout have disclosed that they have found apps that contain and spread spyware programs. Certain software used in the apps had the ability to covertly siphon people’s personal data on their devices without alerting the app makers, Lookout said.

Potential Data Breach of Oceanside Online Utility Payment System

“Residents report abnormalities”

City of Oceanside officials said Tuesday that the internet payment systems where Oceanside residents can pay their utility bills have possibly been breached. Authorities first learned of the potential issue when several residents alerted the municipal institutions, saying the cards they used to pay utility bills had charges to their accounts that had not been authorized. At least two victims used the affected accounts only to pay their utility bill and no other purpose. Though Oceanside officials have not confirmed the utility payment is necessarily the source of the breach, the reports raised the concern and speculation of vulnerability.

Russia-Linked Hackers Leak Football Doping Files

“Fancy Bear claims to be associated with the hacking attacks”

The infamous Fancy Bear, a group of hackers commonly believed to be operating out of Russia has leaked emails and medical records related to football (or soccer, to us Americans) players who have used illegal substances. Fancy Bears has made assertions before to be associated with the broader Anonymous hacktivist movement previously. Their members have constructed a website, fancybears.net, where they leaked numerous files as part of a campaign dubbed “OpOlympics.”

The hackers released a statement in which they comment on their operations: “Today Fancy Bears’ hack team is publishing the material leaked from various sources related to football. Football players and officials unanimously affirm that this kind of sport is free of doping. Our team perceived these numerous claims as a challenge and now we will prove they are lying.”

Enjoy your read? Check out our other content here.

10Fold- Security Never Sleeps- 199

Solar Panel Flaws Put Power Grids Security at Risk: Researcher

“Could allow widescale, lasting outages if hacked”

Researcher Willem Westerhof has identified several serious vulnerabilities in widely used solar power processes that he believes could trigger intense outages for thousands of people. Calling the potential scenario “Horus,” after the ancient Egyptian divine, Westerhof outlines how an attack on solar panel systems could cause billions in damages.

UK organisations could face huge fines for cyber security failures

“Fines of up to £17m in talks”

British organizations could be hit with fines amounting to 4% of global turnover if measure to ensure cybersecurity are not undertaken. Financial penalties, according to the proposals, are intended to be used only as a last resort and not applicable if the institutions can claim that they assess and protect against risk adequately.

Three Hungarian banks targeted by phishing attempts: central bank

“No funds reported as lost”

Three major Hungarian banks have been the targets of phishing attempts in the last several months, with earliest reports of attacks in the month of June. The National Bank of Hungary, the nations central bank who oversees regulations for lending institutions and financial markets, has indicated that no funds have been lost but advises caution in future processes.

Top 5 tools to protect internet privacy

“Learn how to protect and monetize data here”

Years ago the big web search engines like Google, Bing, Yahoo, etc., began to harvest and monetize user web data. This resulted in a public outcry for security and protection services, birthing a new industry. Governments allowing ISP’s to engage in the same practices has created an even bigger demand for these products. Check out the full article for the top 5 internet privacy tools.

Hackers hiding malware threats inside images, report says

“Steganography used to hide malicious code”

Kaspersky Labs is reporting that Cybercriminals are using what has been called the equivalent of cyber steganography, the hiding of hidden messages inside images to conceal activities on a targets computer. Researchers are seeing at least three large-scale operations employing this shifty technique as regular methodology, prompting developing security concerns.

Enjoy your read? Check out our other content here.

10Fold- Security Never Sleeps- 192

GOOGLE FINDS AND BLOCKS SPYWARE LINKED TO CYBERARMS GROUP

“Android spyware blocked”

Google has discovered a new strain of Android malware, Lipizzan, that is able to surveil users text message, emails, calls, and much more. It has yet to appear on many devices, but experts say that it has all the telltale signs signs of a professional, targeted malware intending to attack users in wealthier nations.

Four-Star Kentucky Hotel: Data Breach Could Affect Guests

“Breach threatens customer information”

The Galt House hotel in Louisville, Kentucky has stated that an internal investigation revealed malware has been feeding off the payment processing systems. Any guests staying at the hotel between December 21, 2016 and April 11 are said to have possibly been affected.

Hackers are winning the war as companies worldwide fail on cyber security

“Too many firms are falling short in security”

A new report from Thycotic has shown that most companies worldwide are failing to accurately assess cyber security effectiveness. Survey criteria based on internationally accepted standards in ISO 27001 and best practices from industry experts provides a comprehensive way to define and measure IT security.

Gas Pump Skimmer Sends Card Data Via Text

“Can be detected with mobile devices”

Gas pump card skimming devices most often rely on Bluetooth connectivity to collect the stolen credit card data wirelessly. While often very effective, there is a very apparent downside. Bluetooth-based skimmers can be detected by any user with a bluetooth connected device, and investigators are starting to see these devices send stolen data via text message.

Cyber security not a priority for most sectors, study finds

“Little concern despite huge losses”

A recent study from Savoy Stewart has shown that although data breaches cost UK firms almost £30bn last year, cyber security is still not a big concern for industry sectors. Just 60% of directors or senior managers in finance and insurance consider it a high priority, with data taken from 1,500 firms.

Enjoy your read? Check out our other content here.

Stay ahead of the B2B mobile marketing curve; B2B mobile marketing trends

In the B2B world, marketing is more influential than it’s ever been, as it’s increasingly playing an integral role in organizations’ business strategies and technology purchasing decisions. All you need to do to understand marketing’s prominence in the B2B arena is glance at this infographic detailing the marketing technology landscape in 2017.

And as with most technology-dependent sectors, B2B marketers are realizing that in order to reach their audiences at the right place and right time, they need to have a mobile marketing strategy. Not surprisingly, it’s a trend that Google has jumped on: per Robert Allen of Smart Insights, “More than half of Google’s ad revenue is coming from mobile ads last year … it’s clear that the smartphone has become a gateway to the majority of customer attention.”

It makes sense that mobile has become one of, if not the most important platforms to connect with customers and reach an audience, but marketing for B2B presents a unique set of challenges and requirements for organizations to overcome in order to effectively reach their audiences.

Mobile has connected people not only to each other, but now to content, and this has created a new subset of marketing: content marketing. This is necessary now that over 84 percent of millennials believe their cell phone is imperative for business and not following far behind that the Gen X and baby boomer generations.

With this statement, you could only imagine how important it is for PR and marketing professionals to understand this mobile tool and tap into the creativity of using cell phones for the beneficial platform of the company.

There is new importance in the market and it is content marketing through mobile devices. This is the time to ramp your marketing budget up and apply it to the mobile sphere for your company.

Global marketing is taking new stride in importance. We can see this with the rising popularity in mobile content marketing, overall in the graph above.

With the shift from desktop to mobile visibility, marketers are recognizing that mobile is now more than half of the web traffic they are receiving on their sites. This is shocking to many as we typically think it is desktop, but putting it into perspective how often are you on your mobile device verses your desktop?

Even the giant Google is launching new mobile-first index. Although there is no set date for this, Google does plan to make the switch for their platform this year. This is mainly because they are able to identify as a company that their consumers are mostly transitioning into mobile now.

Google released three pieces of advice to follow in order to prepare your website for the mobile-first index. With more structure to come in the upcoming months.

  1. Make sure your mobile site has the content you want to rank for.
  2. Make sure structured data are on your mobile site.
  3. Make sure rel-annotations are on your mobile site.

This is imperative for marketers and PR professionals alike to understand where the readers are progressing to. It is mobile, and that is where the creativity, time, and budget should be shifting towards.

The next step to take is to update your companies mobile site. This is become more important than the desk top version. If you are not already doing this, it is essential to make this a top priority. Missing out on the curve of the mobile marketing trends will be a lost opportunity.

Today, more than half of B2B companies have mobile sites and apps. Although, the viewership is mainly on the sites verses the apps.

The benefits of going mobile is now being seen by marketers. The top metrics are being aligned with top goals and there is a 75 percent increased in audience engagement and the number of leads increasing by 72 percent additionally, a 57 percent increase in help with company sales.

To create a successful mobile platform, make sure content is relevant and creative. Additionally, emphasize that it is necessary to have content that your audience will value in the little bit of time they have when shifting through their mobile devices.

Mobile, mobile, mobile.

By Gabby Garcy

Enjoy your read? Check out our other content here.

 

Sources:

http://www.smartinsights.com/b2b-digital-marketing/key-b2b-marketing-trends-2016/

http://ww.iamwire.com/2017/06/top-marketing-trends-2017/152475

https://dzone.com/articles/6-mobile-commerce-trends-in-2017-infographic

http://digitalmarketingphilippines.com/the-hottest-b2b-content-marketing-trends-in-2017-infographic/

http://diginomica.com/2017/07/18/b2b-content-strategy-a-quick-twenty-point-gut-check/

http://searchengineland.com/googles-mobile-first-index-still-months-away-271851

 

 

 

 

10Fold- Security Never Sleeps- 179

‘NotPetya’ Hackers Demand $256,000 In Bitcoin To Cure Ransomware Victims

“One of biggest attacks leaves many with a big bill”

Some of the largest industrial firms were infected by the ‘NotPetya’ ransomware and those responsible are demanding 100 Bitcoin, or about $256,000, to decrypt the victims files. A post on Pastebin by an anonymous user said: “Send me 100 Bitcoins and you will get my private key to decrypt any harddisk (except boot disks).”

Fake WannaCry Ransomware Uses NotPetya’s Distribution System

“Distributed through the same channel”

The NotPetya malware was not the only bug to make its way through the M.E.Doc last week. A WannaCry variant that ended up being a fake, FakeCry, was delivered with the same mechanism. Kaspersky found that FakeCry was delivered to the M.E.Doc users on June 27th, the same day as the NotPetya spread. The security firm says that it was run as ed.exe by the parent process ezvit.exe, which led Kaspersky to believe that it utilizes the same delivery system as NotPetya.

Android Ransomware Mimics WannaCry

“WannaCry interface similarities in SLocker”

Windows systems were hit by a ransomware that had an interface mimicking the WannaCry malware last month. TrendMicro security researchers found that one of the first Android ransomware families to encrypt files in exchange for payment, Slocker, has had a major upgrade. SLocker has been seen before, but was offline for a while after the creator had been arrested just days after its initial release.

CopyCat malware infected 14 million outdated Android devices

“Fradulent ad revenue collected”

A new Android malware strain dubbed, CopyCat, has injected itself into over 14 million outdated devices globally. The malware hijacks applications to display fradulent ads, according to CheckPoint researchers. On Thursday, the security firm claimed that most victims were in Asia, but over 280,000 U.S. devices were also affected. Google was tracking the malicious software for the better part of two years, but third party app downloads, phishing attacks, and other avenues make the infection difficult to contain.

Enjoy your read? Check out our other blogs and content here.

10Fold- Security Never Sleeps- 168

Kmart Payment Systems Infected With Malware

“Sears subsidiary in trouble”

Popular department store Kmart has had their payment systems infiltrated by cybercriminals last Wednesday, who were able to remotely install malware into the company processes. No information has been provided as to which stores have been affected or for what duration the hackers had access to the firm’s systems, but with over 700 locations it is estimated by security blogger Brian Krebbs that not all stores were affected.

Google Arms Gmail Security with Machine Learning

“Workplace patches imminent”

Phishing, data loss, and other threats were countered by four new security updates released recently by Google. The patches were intended for workplace threats that commonly affect larger firms.

Most Security Pros Expect to Suffer Cyberattacks via Unsecured IoT

“Wireless printers to thermostats cause concerns”

New reports suggest that the majority of security professionals believe they personally will be victimized by DDoS among other attacks due to ineptly secured IoT devices. The Ponemon Institute expect vulnerabilities in increasingly common devices to be exploited by cyber attackers.

OneLogin suffers breach—customer data said to be exposed, decrypted

“Customer data confirmed to be compromised”

OneLogin has now confirmed that the SSO and ID management company has suffered a serious breach. While their public statement is rather vague, an e-mail to its users details that “customer data was compromised, including the ability to decrypt encrypted data.”

Enjoy your read? Check out our other content here.

10Fold- Security Never Sleeps- 138

Critical McAfee ePO Flaw Patched

“Vulnerability ideal for user reconnaissance”

Intel’s security division has fixed a critical breach in the McAfee ePolicy Orchestrator security management product. Before the patch, users were susceptible to spying of an organizational infrastructure.

How Google fought back against a crippling IoT-powered botnet and won

“Google security engineer gives a behind-the-scenes account”

A bigger picture of the IoT attack on Krebs was revealed by a Google Security engineer at the Enigma security conference last Wednesday. After requests for help from Google, the engineering team weighed the benefits and assisted the website with defensive measures from IoT botnet attacks.

WordPress: Why we didn’t tell you about a big zero-day we fixed last week

“Concerns for users cited”

WordPress intentionally withheld information over security issues, drawing criticism from some users.  Aaron Campbell, a WordPress core Maintainer, gave the following statement regarding the decision:
“It is our stance that security issues should always be disclosed. In this case, we intentionally delayed disclosing this issue by one week to ensure the safety of millions of additional WordPress sites.”

Enjoy your read? Check out our other content here.

10Fold- Security Never Sleeps- 134

Attackers start wiping data from CouchDB and Hadoop databases

“Ransomware groups affect data storage firms”

The inevitable attack from ransomware organizations occurred over the last week, most recently with a data wipe from the databases of MongoDB and Elasticsearch clusters. Hadoop and CouchDB are also experiencing similar attacks.

New Mac malware uses ‘ancient’ code 

“New strain targets biomedical facilities with OS X”

An antiquated strain of malware ‘Quimitchin’ has been discovered by Malwarebytes after unusual outgoing traffic from an outdated Mac operating system was spotted by an IT admin. The research team commented that “in existence, undetected, for some time.”

Billion-dollar Hacker Gang Abuses Google Services To Control Malware

“Over $1 billion stolen from banks globally”

A new Forcepoint report indicates that operators of Carbanak have implemented a new system that allows the cyber-criminals to deliver commands to computers that have suffered from the infection. The infections often spreads through unprotected Google Spreadsheets and Google Forms.

Mobile Security Gap Threatens Enterprises

“New mobile tech causing security concerns”

Two new surveys of IT experts show that malicious software is on the hotlist for researchers. A Ponemon Institute study on behalf of IBM and Arxan found that nearly 84% of IT security practitioners believe that mobile applications are vulnerable to malware threats. IoT application researchers share the concerns at 66%, although at a lower rate.